top of page

Fluent Bit Flaws Expose Cloud to RCE and Stealthy Telemetry Tampering

  • Nov 25, 2025
  • 2 min read

Key Findings


  • Critical authentication bypass vulnerability (CVE-2025-12969) in the `in_forward` plugin allows attackers to connect to Fluent Bit forwarders without authentication

  • Tag key spoofing flaw (CVE-2025-12978) enables attackers to control a record's tag, bypassing configuration security

  • Tag injection vulnerability (CVE-2025-12977) allows attackers to inject problematic characters into tags, leading to log corruption and output injection

  • Path traversal vulnerability (CVE-2025-12972) in the `out_file` plugin enables attackers to write files anywhere on the filesystem, including remote code execution

  • Stack buffer overflow (CVE-2025-12970) in the Docker Metrics input plugin can be exploited to crash the agent or execute arbitrary code


Background


Fluent Bit is a popular, lightweight telemetry agent used by major organizations in finance, delivery apps, and cloud platforms. Due to its position on the ingestion path and its handling of sensitive data and untrusted input, any vulnerabilities in Fluent Bit can become "high impact security issues."


Authentication Bypass (CVE-2025-12969)


The `in_forward` plugin, which receives logs from other agents, has a critical authentication bypass. If operators configure it with `Security.Users` (username and password authentication) but do not set a `Shared_Key`, the report found that "authentication is not enforced." This "leaves many fluent-bit forwarders open to attacker connections while giving users a false sense of security." An attacker could "flood a security product's logs with false events to spam alerts to overwhelm security teams" or inject false data to hide their activity.


Tag Key Spoofing (CVE-2025-12978)


This flaw allows an attacker to control a record's tag, bypassing configuration security. The issue lies in a partial string comparison in the `tag_key()` method. The comparison checks the size of the user input key, "meaning that an attacker can send just the first letter and match the Tag_Key." In short, "by guessing just the first letter of a tag key an attacker can spoof the tag on log data and control where and how it's processed."


Tag Injection (CVE-2025-12977)


Tags derived dynamically from a record using `Tag_Key` bypass the normal sanitization process. This allows an attacker to inject problematic characters like spaces, newlines, or path traversal patterns (`../`) into the tag. This can lead to "log corruption, output injection, and in some setups path traversal."


Path Traversal File Write (CVE-2025-12972)


The most critical outcome is a path traversal vulnerability in the `out_file` plugin. When the file output lacks a defined `File` key, it uses the tag to create the file name. Since the tag can be controlled (and injected with `../` from the previous flaws), "Attackers can use path traversal characters `'../'` in the Tag to change the file path and name." This can lead to RCE on many systems, allowing attackers to "create or overwrite files anywhere on the filesystem, which can lead to tampered logs, planted malicious files, and remote code execution."


Stack Buffer Overflow (CVE-2025-12970)


Separately, a stack buffer overflow exists in the Docker Metrics input plugin (`in_docker`). The plugin copies a container's name into a fixed 256-byte stack buffer without checking its length. An attacker who can create a container with an "excessively long name" can "crash the agent or execute arbitrary code."


Sources


  • https://securityonline.info/critical-fluent-bit-flaws-enable-rce-and-telemetry-tampering-in-major-orgs/

  • https://x.com/fridaysecurity/status/1993155180570063256

  • https://x.com/the_yellow_fall/status/1993154888759664922

  • https://www.cypro.se/2025/11/24/new-fluent-bit-flaws-expose-cloud-to-rce-and-stealthy-infrastructure-intrusions/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page