CVE-2025-57564
Published: 07 October 2025
Summary
CVE-2025-57564 is a high-severity Improper Output Neutralization for Logs (CWE-117) vulnerability. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-9 (Protection of Audit Information).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces authentication and authorization requirements on the /api/logs/insert/elasticsearch/_bulk endpoint to prevent unauthenticated access and arbitrary log injection.
Requires validation of all inputs to the log insertion endpoint, directly mitigating the lack of input validation that enables log poisoning.
Protects audit and log information from unauthorized fabrication and modification, countering the injection of false log entries that lead to poisoning and alert obfuscation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated remote exploitation of public API endpoint maps to T1190; resulting log poisoning and alert obfuscation maps to T1054 Indicator Blocking.
NVD Description
CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead…
more
to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.
Deeper analysisAI
CVE-2025-57564 is an unauthenticated log injection vulnerability in the CubeAPM platform, specifically the nightly-2025-08-01-1 build, though the issue exists in the core platform across deployments. The vulnerable /api/logs/insert/elasticsearch/_bulk endpoint accepts bulk log data without authentication or input validation, enabling remote attackers to inject arbitrary log entries into production systems. This flaw, published on 2025-10-07, carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and is classified under CWE-117.
Unauthenticated attackers with network access can exploit this endpoint remotely with low complexity and no privileges required. Exploitation allows injection of false log entries, leading to log poisoning, obfuscation of security alerts, and potential performance degradation in the observability pipeline.
Advisories and additional details are available in the provided references: https://github.com/prassan10/CubeAPM/blob/main/CVE-2025-57564%3A%20Unauthenticated%20Log%20Injection%20in%20CubeAPM and https://github.com/prassan10/CubeAPM/blob/main/Unauthenticated-Log_Injection.
Details
- CWE(s)