BIT-fluent-bit-2025-12977

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/fluent-bit/BIT-fluent-bit-2025-12977.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-fluent-bit-2025-12977
Aliases
Published
2025-12-01T20:38:29.084Z
Modified
2025-12-01T21:42:55.319032Z
Summary
CVE-2025-12977
Details

Fluent Bit inhttp, insplunk, and inelasticsearch input plugins fail to sanitize tagkey inputs. An attacker with network access or the ability to write records into Splunk or Elasticsearch can supply tag_key values containing special characters such as newlines or ../ that are treated as valid tags. Because tags influence routing and some outputs derive filenames or contents from tags, this can allow newline injection, path traversal, forged record injection, or log misrouting, impacting data integrity and log routing.

Database specific
{
    "cpes": [
        "cpe:2.3:a:treasuredata:fluent_bit:*:*:*:*:*:*:*:*"
    ],
    "severity": "Critical"
}
References

Affected packages

Bitnami / fluent-bit

Package

Name
fluent-bit
Purl
pkg:bitnami/fluent-bit

Severity

  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
4.1.0
Fixed
4.1.1

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/fluent-bit/BIT-fluent-bit-2025-12977.json"