CVE-2026-26931Memory Allocation with Excessive Size Value in Metricbeat

Severity
5.7MEDIUMNVD
EPSS
0.0%
top 95.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 19
Latest updateApr 7

Description

Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130).

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.1 | Impact: 3.6

Affected Packages2 packages

CVEListV5elastic/metricbeat8.0.08.19.12
Gogithub.com/elastic_beats_v7< 7.0.0-alpha2.0.20260112100137-de072c4e371e

🔴Vulnerability Details

4
OSV
Metricbeat Allocates Memory with Excessive Size Value Leading to Denial of Service in github.com/elastic/beats2026-04-07
OSV
Metricbeat Allocates Memory with Excessive Size Value Leading to Denial of Service2026-03-19
GHSA
Metricbeat Allocates Memory with Excessive Size Value Leading to Denial of Service2026-03-19
CVEList
Memory Allocation with Excessive Size Value in Metricbeat Leading to Denial of Service2026-03-19

🕵️Threat Intelligence

1
Wiz
CVE-2026-26931 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-26931 — Elastic Metricbeat vulnerability | cvebase