CVE-2025-12978Fluent BIT vulnerability

3 documents3 sources
Severity
5.4MEDIUMNVD
EPSS
0.2%
top 58.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 24
Latest updateDec 1

Description

Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins contain a flaw in the tag_key validation logic that fails to enforce exact key-length matching. This allows crafted inputs where a tag prefix is incorrectly treated as a full match. A remote attacker with authenticated or exposed access to these input endpoints can exploit this behavior to manipulate tags and redirect records to unintended destinations. This compromises the authenticity of ingested logs and can allow injection of

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:LExploitability: 2.8 | Impact: 2.5

Affected Packages2 packages

CVEListV5fluentbit/fluent_bit< 4.0.12

🔴Vulnerability Details

1
GHSA
GHSA-7qw4-6c7x-f3pj: Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins contain a flaw in the tag_key validation logic that fails to enforce exact key-lengt2025-11-24

🕵️Threat Intelligence

1
Wiz
Supply Chain Attacks &amp; AI Vulnerabilities: December Cloud Security Update | Wiz2025-12-01