BIT-fluent-bit-2025-12978

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/fluent-bit/BIT-fluent-bit-2025-12978.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-fluent-bit-2025-12978
Aliases
Published
2025-12-01T20:38:30.394Z
Modified
2025-12-01T21:42:55.389433Z
Summary
CVE-2025-12978
Details

Fluent Bit inhttp, insplunk, and inelasticsearch input plugins contain a flaw in the tagkey validation logic that fails to enforce exact key-length matching. This allows crafted inputs where a tag prefix is incorrectly treated as a full match. A remote attacker with authenticated or exposed access to these input endpoints can exploit this behavior to manipulate tags and redirect records to unintended destinations. This compromises the authenticity of ingested logs and can allow injection of forged data, alert flooding and routing manipulation.

Database specific
{
    "cpes": [
        "cpe:2.3:a:treasuredata:fluent_bit:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / fluent-bit

Package

Name
fluent-bit
Purl
pkg:bitnami/fluent-bit

Severity

  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
4.1.0
Fixed
4.1.1

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/fluent-bit/BIT-fluent-bit-2025-12978.json"