Description
Fluent Bit in_http, in_splunk, and in_elasticsearch input plugins fail to sanitize tag_key inputs. An attacker with network access or the ability to write records into Splunk or Elasticsearch can supply tag_key values containing special characters such as newlines or ../ that are treated as valid tags. Because tags influence routing and some outputs derive filenames or contents from tags, this can allow newline injection, path traversal, forged record injection, or log misrouting, impacting data integrity and log routing.
INFO
Published Date :
2025-11-24T14:40:12.642Z
Last Modified :
2025-11-24T19:14:10.912Z
Source :
certcc
AFFECTED PRODUCTS
The following products are affected by CVE-2025-12977 vulnerability.
No data.
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-12977.
| URL | Resource |
|---|---|
| https://fluentbit.io/announcements/v4.1.0/ |
|