Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. When the File option is omitted, the plugin uses untrusted tag input to construct file paths. This allows attackers with network access to craft tags containing path traversal sequences that cause Fluent Bit to write files outside the intended output directory.
References
Configurations
History
28 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
28 Nov 2025, 15:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:treasuredata:fluent_bit:4.1.0:*:*:*:*:*:*:* | |
| References | () https://fluentbit.io/announcements/v4.1.0/ - Release Notes | |
| CWE | CWE-22 | |
| First Time |
Treasuredata fluent Bit
Treasuredata |
24 Nov 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
24 Nov 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-24 15:15
Updated : 2025-11-28 18:15
NVD link : CVE-2025-12972
Mitre link : CVE-2025-12972
CVE.ORG link : CVE-2025-12972
JSON object : View
Products Affected
treasuredata
- fluent_bit
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
