CVE-2025-12978
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-24

Last updated on: 2025-11-28

Assigner: CERT/CC

Description
Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins contain a flaw in the tag_key validation logic that fails to enforce exact key-length matching. This allows crafted inputs where a tag prefix is incorrectly treated as a full match. A remote attacker with authenticated or exposed access to these input endpoints can exploit this behavior to manipulate tags and redirect records to unintended destinations. This compromises the authenticity of ingested logs and can allow injection of forged data, alert flooding and routing manipulation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-24
Last Modified
2025-11-28
Generated
2026-05-07
AI Q&A
2025-11-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
treasuredata fluent_bit 4.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Fluent Bit's in_http, in_splunk, and in_elasticsearch input plugins where the tag_key validation logic does not enforce exact key-length matching. This flaw allows crafted inputs with tag prefixes to be incorrectly treated as full matches, enabling a remote attacker with authenticated or exposed access to manipulate tags and redirect log records to unintended destinations.


How can this vulnerability impact me? :

The vulnerability can compromise the authenticity of ingested logs by allowing attackers to inject forged data, cause alert flooding, and manipulate routing of log records. This can lead to incorrect log data being processed or stored, potentially impacting monitoring, alerting, and forensic analysis.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart