CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
References
Configurations
No configuration.
History
08 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-117 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
07 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-07 14:15
Updated : 2025-10-08 19:38
NVD link : CVE-2025-57564
Mitre link : CVE-2025-57564
CVE.ORG link : CVE-2025-57564
JSON object : View
Products Affected
No product.
CWE
CWE-117
Improper Output Neutralization for Logs
