Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. When the File option is omitted, the plugin uses untrusted tag input to construct file paths. This allows attackers with network access to craft tags containing path traversal sequences that cause Fluent Bit to write files outside the intended output directory.
History

Fri, 28 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
References

Fri, 28 Nov 2025 18:00:00 +0000


Fri, 28 Nov 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Treasuredata
Treasuredata fluent Bit
Weaknesses CWE-22
CPEs cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:*
Vendors & Products Treasuredata
Treasuredata fluent Bit

Thu, 27 Nov 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Fluentbit
Fluentbit fluent Bit
Vendors & Products Fluentbit
Fluentbit fluent Bit

Mon, 24 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 14:45:00 +0000

Type Values Removed Values Added
Description Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. When the File option is omitted, the plugin uses untrusted tag input to construct file paths. This allows attackers with network access to craft tags containing path traversal sequences that cause Fluent Bit to write files outside the intended output directory.
Title CVE-2025-12972
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published: 2025-11-24T14:40:36.275Z

Updated: 2025-11-28T17:45:25.345Z

Reserved: 2025-11-10T18:00:22.449Z

Link: CVE-2025-12972

cve-icon Vulnrichment

Updated: 2025-11-24T19:08:51.064Z

cve-icon NVD

Status : Modified

Published: 2025-11-24T15:15:46.627

Modified: 2025-11-28T18:15:46.400

Link: CVE-2025-12972

cve-icon Redhat

No data.