CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cubeapm
Cubeapm cubeapm |
|
| Vendors & Products |
Cubeapm
Cubeapm cubeapm |
Wed, 08 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-117 | |
| Metrics |
cvssV3_1
|
Tue, 07 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-07T00:00:00.000Z
Updated: 2025-10-08T13:32:44.717Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57564
Updated: 2025-10-08T13:31:35.470Z
Status : Awaiting Analysis
Published: 2025-10-07T14:15:38.807
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-57564
No data.