CVE-2025-12978
Fluent Bit vulnerability analysis and mitigation

Fluent Bit inhttp, insplunk, and inelasticsearch input plugins contain a flaw in the tagkey validation logic that fails to enforce exact key-length matching. This allows crafted inputs where a tag prefix is incorrectly treated as a full match. A remote attacker with authenticated or exposed access to these input endpoints can exploit this behavior to manipulate tags and redirect records to unintended destinations. This compromises the authenticity of ingested logs and can allow injection of forged data, alert flooding and routing manipulation.


SourceNVD

Related Fluent Bit vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-12977CRITICAL9.1
  • Fluent BitFluent Bit
  • cpe:2.3:a:treasuredata:fluent_bit
NoYesNov 24, 2025
CVE-2025-12970HIGH8.8
  • Fluent BitFluent Bit
  • fluent-bit
NoYesNov 24, 2025
CVE-2025-12969MEDIUM6.5
  • Fluent BitFluent Bit
  • cpe:2.3:a:treasuredata:fluent_bit
NoYesNov 24, 2025
CVE-2025-12978MEDIUM5.4
  • Fluent BitFluent Bit
  • cpe:2.3:a:treasuredata:fluent_bit
NoYesNov 24, 2025
CVE-2025-12972MEDIUM5.3
  • Fluent BitFluent Bit
  • cpe:2.3:a:treasuredata:fluent_bit
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management