CVE-2025-12972

Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. When the File option is omitted, the plugin uses untrusted tag input to construct file paths. This allows attackers with network access to craft tags containing path traversal sequences that cause Fluent Bit to write files outside the intended output directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:*

History

28 Nov 2025, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://fluentbit.io/announcements/v4.1.0/', 'tags': ['Release Notes'], 'source': '[email protected]'}
  • () https://fluentbit.io/blog/2025/10/28/security-vulnerabilities-addressed-in-fluent-bit-v4.1-and-backported-to-v4.0/ -
  • () https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover -

28 Nov 2025, 15:23

Type Values Removed Values Added
CPE cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:*
References () https://fluentbit.io/announcements/v4.1.0/ - () https://fluentbit.io/announcements/v4.1.0/ - Release Notes
CWE CWE-22
First Time Treasuredata fluent Bit
Treasuredata

24 Nov 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

24 Nov 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-24 15:15

Updated : 2025-11-28 18:15


NVD link : CVE-2025-12972

Mitre link : CVE-2025-12972

CVE.ORG link : CVE-2025-12972


JSON object : View

Products Affected

treasuredata

  • fluent_bit
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')