Treasuredata Fluent Bit vulnerabilities

16 known vulnerabilities affecting treasuredata/fluent_bit.

Total CVEs
16
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH10MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2025-12977CRITICALCVSS 9.1v4.1.02025-11-24
CVE-2025-12977 [CRITICAL] CWE-1287 CVE-2025-12977: Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins fail to sanitize tag_key inputs. A Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins fail to sanitize tag_key inputs. An attacker with network access or the ability to write records into Splunk or Elasticsearch can supply tag_key values containing special characters such as newlines or ../ that are treated as valid tags. Because tags influence routing and some outp
nvd
CVE-2025-12970HIGHCVSS 8.8v4.1.02025-11-24
CVE-2025-12970 [HIGH] CWE-120 CVE-2025-12970: The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed s The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.
nvd
CVE-2025-12972MEDIUMCVSS 5.3v4.1.02025-11-24
CVE-2025-12972 [MEDIUM] CWE-22 CVE-2025-12972: Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. Wh Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. When the File option is omitted, the plugin uses untrusted tag input to construct file paths. This allows attackers with network access to craft tags containing path traversal sequences that cause Fluent Bit to write files outside the intended output dir
nvd
CVE-2025-12969MEDIUMCVSS 6.5v4.1.02025-11-24
CVE-2025-12969 [MEDIUM] CWE-306 CVE-2025-12969: Fluent Bit in_forward input plugin does not properly enforce the security.users authentication mecha Fluent Bit in_forward input plugin does not properly enforce the security.users authentication mechanism under certain configuration conditions. This allows remote attackers with network access to the Fluent Bit instance exposing the forward input to send unauthenticated data. By bypassing authentication controls, attackers can inject forged log rec
nvd
CVE-2025-12978MEDIUMCVSS 5.4v4.1.02025-11-24
CVE-2025-12978 [MEDIUM] CVE-2025-12978: Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins contain a flaw in the tag_key vali Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins contain a flaw in the tag_key validation logic that fails to enforce exact key-length matching. This allows crafted inputs where a tag prefix is incorrectly treated as a full match. A remote attacker with authenticated or exposed access to these input endpoints can exploit this behavior to ma
nvd
CVE-2024-50608HIGHCVSS 7.5v3.1.92025-02-18
CVE-2024-50608 [HIGH] CWE-476 CVE-2024-50608: An issue was discovered in Fluent Bit 3.1.9. When the Prometheus Remote Write input plugin is runnin An issue was discovered in Fluent Bit 3.1.9. When the Prometheus Remote Write input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service a
nvd
CVE-2024-50609HIGHCVSS 7.5v3.1.92025-02-18
CVE-2024-50609 [HIGH] CWE-476 CVE-2024-50609: An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and list An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The
nvd
CVE-2024-4323CRITICALCVSS 9.8≥ 2.0.7, < 2.2.3≥ 3.0.0, < 3.0.42024-05-20
CVE-2024-4323 [CRITICAL] CWE-122 CVE-2024-4323: A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the em A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.
nvd
CVE-2024-23722HIGHCVSS 7.5≥ 2.1.8, < 2.2.22024-03-26
CVE-2024-23722 [HIGH] CWE-476 CVE-2024-23722: In Fluent Bit 2.1.8 through 2.2.1, a NULL pointer dereference can be caused via an invalid HTTP payl In Fluent Bit 2.1.8 through 2.2.1, a NULL pointer dereference can be caused via an invalid HTTP payload with the content type of x-www-form-urlencoded. It crashes and does not restart. This could result in logs not being delivered properly.
nvd
CVE-2024-26455HIGHCVSS 7.5v2.2.22024-02-26
CVE-2024-26455 [HIGH] CWE-416 CVE-2024-26455: fluent-bit 2.2.2 contains a Use-After-Free vulnerability in /fluent-bit/plugins/custom_calyptia/caly fluent-bit 2.2.2 contains a Use-After-Free vulnerability in /fluent-bit/plugins/custom_calyptia/calyptia.c.
nvd
CVE-2021-46878HIGHCVSS 7.8v1.7.12023-04-11
CVE-2021-46878 [HIGH] CWE-843 CVE-2021-46878: An issue was discovered in Treasure Data Fluent Bit 1.7.1, erroneous parsing in flb_pack_msgpack_to_ An issue was discovered in Treasure Data Fluent Bit 1.7.1, erroneous parsing in flb_pack_msgpack_to_json_format leads to type confusion bug that interprets whatever is on the stack as msgpack maps and arrays, leading to use-after-free. This can be used by an attacker to craft a specially craft file and trick the victim opening it using the affect soft
nvd
CVE-2021-46879HIGHCVSS 7.8v1.7.12023-04-11
CVE-2021-46879 [HIGH] CWE-787 CVE-2021-46879: An issue was discovered in Treasure Data Fluent Bit 1.7.1, a wrong variable is used to get the msgpa An issue was discovered in Treasure Data Fluent Bit 1.7.1, a wrong variable is used to get the msgpack data resulting in a heap overflow in flb_msgpack_gelf_value_ext. An attacker can craft a malicious file and tick the victim to open the file with the software, triggering a heap overflow and execute arbitrary code on the target system.
nvd
CVE-2021-36088CRITICALCVSS 9.8≥ 1.7.0, ≤ 1.7.42021-07-01
CVE-2021-36088 [CRITICAL] CWE-415 CVE-2021-36088: Fluent Bit (aka fluent-bit) 1.7.0 through 1.7.4 has a double free in flb_free (called from flb_parse Fluent Bit (aka fluent-bit) 1.7.0 through 1.7.4 has a double free in flb_free (called from flb_parser_json_do and flb_parser_do).
nvd
CVE-2021-27186HIGHCVSS 7.5v1.6.102021-02-10
CVE-2021-27186 [HIGH] CWE-476 CVE-2021-27186: Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c.
nvd
CVE-2020-35963HIGHCVSS 7.8fixed in 1.6.42021-01-03
CVE-2020-35963 [HIGH] CWE-787 CVE-2020-35963: flb_gzip_compress in flb_gzip.c in Fluent Bit before 1.6.4 has an out-of-bounds write because it doe flb_gzip_compress in flb_gzip.c in Fluent Bit before 1.6.4 has an out-of-bounds write because it does not use the correct calculation of the maximum gzip data-size expansion.
nvd
CVE-2019-9749HIGHCVSS 7.5≤ 1.0.42019-03-13
CVE-2019-9749 [HIGH] CWE-681 CVE-2019-9749: An issue was discovered in the MQTT input plugin in Fluent Bit through 1.0.4. When this plugin acts An issue was discovered in the MQTT input plugin in Fluent Bit through 1.0.4. When this plugin acts as an MQTT broker (server), it mishandles incoming network messages. After processing a crafted packet, the plugin's mqtt_packet_drop function (in /plugins/in_mqtt/mqtt_prot.c) executes the memmove() function with a negative size parameter. That leads to a
nvd