CVE-2025-12972

Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. When the File option is omitted, the plugin uses untrusted tag input to construct file paths. This allows attackers with network access to craft tags containing path traversal sequences that cause Fluent Bit to write files outside the intended output directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:*

History

28 Nov 2025, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://fluentbit.io/announcements/v4.1.0/', 'tags': ['Release Notes'], 'source': 'cret@cert.org'}
  • () https://fluentbit.io/blog/2025/10/28/security-vulnerabilities-addressed-in-fluent-bit-v4.1-and-backported-to-v4.0/ -
  • () https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover -

28 Nov 2025, 15:23

Type Values Removed Values Added
CPE cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:*
First Time Treasuredata fluent Bit
Treasuredata
References () https://fluentbit.io/announcements/v4.1.0/ - () https://fluentbit.io/announcements/v4.1.0/ - Release Notes
CWE CWE-22

24 Nov 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

24 Nov 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-24 15:15

Updated : 2025-11-28 18:15


NVD link : CVE-2025-12972

Mitre link : CVE-2025-12972

CVE.ORG link : CVE-2025-12972


JSON object : View

Products Affected

treasuredata

  • fluent_bit
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')