CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-07T14:02:49.931Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57564

No data.

Status : Received
Published: 2025-10-07T14:15:38.807
Modified: 2025-10-07T14:15:38.807
Link: CVE-2025-57564

No data.

No data.