Cyber Posture

CVE-2025-57564

High

Published: 07 October 2025

Published
07 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0010 27.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-57564 is a high-severity Improper Output Neutralization for Logs (CWE-117) vulnerability. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-9 (Protection of Audit Information).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces authentication and authorization requirements on the /api/logs/insert/elasticsearch/_bulk endpoint to prevent unauthenticated access and arbitrary log injection.

prevent

Requires validation of all inputs to the log insertion endpoint, directly mitigating the lack of input validation that enables log poisoning.

prevent

Protects audit and log information from unauthorized fabrication and modification, countering the injection of false log entries that lead to poisoning and alert obfuscation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1054 Indicator Blocking Stealth
An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed.
Why these techniques?

Direct unauthenticated remote exploitation of public API endpoint maps to T1190; resulting log poisoning and alert obfuscation maps to T1054 Indicator Blocking.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

CubeAPM nightly-2025-08-01-1 allow unauthenticated attackers to inject arbitrary log entries into production systems via the /api/logs/insert/elasticsearch/_bulk endpoint. This endpoint accepts bulk log data without requiring authentication or input validation, allowing remote attackers to perform unauthorized log injection. Exploitation may lead…

more

to false log entries, log poisoning, alert obfuscation, and potential performance degradation of the observability pipeline. The issue is present in the core CubeAPM platform and is not limited to specific deployment configurations.

Deeper analysisAI

CVE-2025-57564 is an unauthenticated log injection vulnerability in the CubeAPM platform, specifically the nightly-2025-08-01-1 build, though the issue exists in the core platform across deployments. The vulnerable /api/logs/insert/elasticsearch/_bulk endpoint accepts bulk log data without authentication or input validation, enabling remote attackers to inject arbitrary log entries into production systems. This flaw, published on 2025-10-07, carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and is classified under CWE-117.

Unauthenticated attackers with network access can exploit this endpoint remotely with low complexity and no privileges required. Exploitation allows injection of false log entries, leading to log poisoning, obfuscation of security alerts, and potential performance degradation in the observability pipeline.

Advisories and additional details are available in the provided references: https://github.com/prassan10/CubeAPM/blob/main/CVE-2025-57564%3A%20Unauthenticated%20Log%20Injection%20in%20CubeAPM and https://github.com/prassan10/CubeAPM/blob/main/Unauthenticated-Log_Injection.

Details

CWE(s)

CVEs Like This One

CVE-2025-59784Shared CWE-117
CVE-2026-25548Shared CWE-117
CVE-2025-27111Shared CWE-117
CVE-2026-34478Shared CWE-117
CVE-2024-9606Shared CWE-117

References