CVE-2026-26940Improper Validation of Specified Quantity in Input in Kibana

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 82.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 19

Description

Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantity value.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDelastic/kibana8.0.08.19.13+2
CVEListV5elastic/kibana9.3.09.3.1+2

🔴Vulnerability Details

2
GHSA
GHSA-xfph-vq69-5ww2: Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive2026-03-19
CVEList
Improper Validation of Specified Quantity in Input in Kibana Leading to Denial of Service2026-03-19

📋Vendor Advisories

1
Red Hat
Kibana: Timelion: Kibana Timelion Plugin: Denial of Service via improper input validation in Timelion expressions2026-03-19

🕵️Threat Intelligence

1
Wiz
CVE-2026-26940 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-26940 — Elastic Kibana vulnerability | cvebase