CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cubeapm
Cubeapm cubeapm |
|
Vendors & Products |
Cubeapm
Cubeapm cubeapm |
Wed, 08 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-117 | |
Metrics |
cvssV3_1
|
Tue, 07 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-08T13:32:44.717Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57564

Updated: 2025-10-08T13:31:35.470Z

Status : Awaiting Analysis
Published: 2025-10-07T14:15:38.807
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-57564

No data.