Home

Description

Fluent Bit out_file plugin does not properly sanitize tag values when deriving output file names. When the File option is omitted, the plugin uses untrusted tag input to construct file paths. This allows attackers with network access to craft tags containing path traversal sequences that cause Fluent Bit to write files outside the intended output directory.

PUBLISHED Reserved 2025-11-10 | Published 2025-11-24 | Updated 2025-11-28 | Assigner certcc

Problem types

CWE-35: Path Traversal

Product status

4.0.14
affected

4.1.1
affected

References

www.oligo.security/...-cloud-environments-to-remote-takeover

fluentbit.io/...d-in-fluent-bit-v4.1-and-backported-to-v4.0/

cve.org (CVE-2025-12972)

nvd.nist.gov (CVE-2025-12972)

Download JSON