CVE-2025-12977Improper Validation of Specified Type of Input in Fluent BIT

Severity
9.1CRITICALNVD
EPSS
0.1%
top 70.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 24
Latest updateDec 1

Description

Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins fail to sanitize tag_key inputs. An attacker with network access or the ability to write records into Splunk or Elasticsearch can supply tag_key values containing special characters such as newlines or ../ that are treated as valid tags. Because tags influence routing and some outputs derive filenames or contents from tags, this can allow newline injection, path traversal, forged record injection, or log misrouting, impacting data

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

🔴Vulnerability Details

1
GHSA
GHSA-v498-rhc6-28g9: Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins fail to sanitize tag_key inputs2025-11-24

📋Vendor Advisories

1
Microsoft
CVE-2025-12977: CVE-2025-12977 Mariner: Mariner certcc: certcc Customer Action Required: Yes Remediation: CBL-Mariner Releases Reference: https://learn2025-11-11

🕵️Threat Intelligence

1
Wiz
Supply Chain Attacks & AI Vulnerabilities: December Cloud Security Update | Wiz2025-12-01