Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins fail to sanitize tag_key inputs. An attacker with network access or the ability to write records into Splunk or Elasticsearch can supply tag_key values containing special characters such as newlines or ../ that are treated as valid tags. Because tags influence routing and some outputs derive filenames or contents from tags, this can allow newline injection, path traversal, forged record injection, or log misrouting, impacting data integrity and log routing.
Metrics
Affected Vendors & Products
References
History
Fri, 28 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Treasuredata
Treasuredata fluent Bit |
|
| CPEs | cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Treasuredata
Treasuredata fluent Bit |
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fluentbit
Fluentbit fluent Bit |
|
| Vendors & Products |
Fluentbit
Fluentbit fluent Bit |
Mon, 24 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1287 | |
| Metrics |
cvssV3_1
|
Mon, 24 Nov 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins fail to sanitize tag_key inputs. An attacker with network access or the ability to write records into Splunk or Elasticsearch can supply tag_key values containing special characters such as newlines or ../ that are treated as valid tags. Because tags influence routing and some outputs derive filenames or contents from tags, this can allow newline injection, path traversal, forged record injection, or log misrouting, impacting data integrity and log routing. | |
| Title | CVE-2025-12977 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published: 2025-11-24T14:40:12.642Z
Updated: 2025-11-28T17:45:09.423Z
Reserved: 2025-11-10T18:57:07.686Z
Link: CVE-2025-12977
Updated: 2025-11-24T19:13:05.578Z
Status : Modified
Published: 2025-11-24T15:15:46.770
Modified: 2025-11-28T18:15:46.550
Link: CVE-2025-12977
No data.