CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
History

Tue, 07 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Description CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-07T14:02:49.931Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57564

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-07T14:15:38.807

Modified: 2025-10-07T14:15:38.807

Link: CVE-2025-57564

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.