Elastic Kibana vulnerabilities

108 known vulnerabilities affecting elastic/kibana.

Total CVEs
108
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL7HIGH23MEDIUM76LOW2

Vulnerabilities

Page 1 of 6
CVE-2026-4498HIGHCVSS 7.7≥ 8.0.0, < 8.19.14≥ 9.0.0, < 9.2.8+2 more2026-04-08
CVE-2026-4498 [HIGH] CWE-250 CVE-2026-4498: Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can le Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents, agent policies, and settings management).
cvelistv5nvd
CVE-2026-33458HIGHCVSS 7.7≥ 9.3.0, < 9.3.3≥ 9.3.0, ≤ 9.3.22026-04-08
CVE-2026-33458 [HIGH] CWE-918 CVE-2026-33458: Server-Side Request Forgery (CWE-918) in Kibana One Workflow can lead to information disclosure. An Server-Side Request Forgery (CWE-918) in Kibana One Workflow can lead to information disclosure. An authenticated user with workflow creation and execution privileges can bypass host allowlist restrictions in the Workflows Execution Engine, potentially exposing sensitive internal endpoints and data.
cvelistv5nvd
CVE-2026-33461HIGHCVSS 7.7≥ 9.3.0, ≤ 9.3.2≥ 9.0.0, ≤ 9.2.7+1 more2026-04-08
CVE-2026-33461 [HIGH] CWE-863 CVE-2026-33461: Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse ( Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122). A user with limited Fleet privileges can exploit an internal API endpoint to retrieve sensitive configuration data, including private keys and authentication tokens, that should only be accessible to users with higher-level settings privileg
cvelistv5nvd
CVE-2026-33459MEDIUMCVSS 6.5≥ 8.15.0, < 8.19.14≥ 9.0.0, < 9.2.8+4 more2026-04-08
CVE-2026-33459 [MEDIUM] CWE-400 CVE-2026-33459: Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Al Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130). An authenticated user with access to the automatic import feature can submit specially crafted requests with excessively large input values. When multiple such requests are sent concurrently, the backend services become unstable,
cvelistv5nvd
CVE-2026-33460MEDIUMCVSS 4.3≥ 9.3.0, ≤ 9.3.2≥ 9.0.0, ≤ 9.2.7+1 more2026-04-08
CVE-2026-33460 [MEDIUM] CWE-863 CVE-2026-33460: Incorrect Authorization (CWE-863) in Kibana can lead to cross-space information disclosure via Privi Incorrect Authorization (CWE-863) in Kibana can lead to cross-space information disclosure via Privilege Abuse (CAPEC-122). A user with Fleet agent management privileges in one Kibana space can retrieve Fleet Server policy details from other spaces through an internal enrollment endpoint. The endpoint bypasses space-scoped access controls by using a
cvelistv5nvd
CVE-2026-26939MEDIUMCVSS 6.5≥ 8.0.0, < 8.19.12≥ 9.0.0, < 9.2.6+4 more2026-03-19
CVE-2026-26939 [MEDIUM] CWE-862 CVE-2026-26939: Missing Authorization (CWE-862) in Kibana’s server-side Detection Rule Management can lead to Unauth Missing Authorization (CWE-862) in Kibana’s server-side Detection Rule Management can lead to Unauthorized Endpoint Response Action Configuration (host isolation, process termination, and process suspension) via CAPEC-1 (Accessing Functionality Not Properly Constrained by ACLs). This requires an authenticated attacker with rule management privileges
cvelistv5nvd
CVE-2026-26940MEDIUMCVSS 6.5≥ 8.0.0, < 8.19.13≥ 9.0.0, < 9.2.7+4 more2026-03-19
CVE-2026-26940 [MEDIUM] CWE-1284 CVE-2026-26940: Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin i Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantit
cvelistv5nvd
CVE-2026-26936HIGHCVSS 7.5≥ 8.0.0, < 8.19.11≥ 9.0.0, < 9.2.5+2 more2026-02-26
CVE-2026-26936 [HIGH] CWE-1333 CVE-2026-26936: Inefficient Regular Expression Complexity (CWE-1333) in the AI Inference Anonymization Engine in Kib Inefficient Regular Expression Complexity (CWE-1333) in the AI Inference Anonymization Engine in Kibana can lead Denial of Service via Regular Expression Exponential Blowup (CAPEC-492).
cvelistv5nvd
CVE-2026-26937HIGHCVSS 7.5≥ 8.0.0, < 8.19.11≥ 9.0.0, < 9.2.5+2 more2026-02-26
CVE-2026-26937 [HIGH] CWE-400 CVE-2026-26937: Uncontrolled Resource Consumption (CWE-400) in the Timelion component in Kibana can lead Denial of S Uncontrolled Resource Consumption (CWE-400) in the Timelion component in Kibana can lead Denial of Service via Input Data Manipulation (CAPEC-153)
cvelistv5nvd
CVE-2026-26938HIGHCVSS 7.7v9.3.0≥ 9.3.0, ≤ 9.3.02026-02-26
CVE-2026-26938 [HIGH] CWE-1336 CVE-2026-26938: Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:execu
cvelistv5nvd
CVE-2026-26935HIGHCVSS 7.5≥ 8.4.0, < 8.19.12≥ 9.0.0, < 9.2.6+4 more2026-02-26
CVE-2026-26935 [HIGH] CWE-20 CVE-2026-26935: Improper Input Validation (CWE-20) in the internal Content Connectors search endpoint in Kibana can Improper Input Validation (CWE-20) in the internal Content Connectors search endpoint in Kibana can lead Denial of Service via Input Data Manipulation (CAPEC-153)
cvelistv5nvd
CVE-2026-26934MEDIUMCVSS 6.5≥ 8.18.0, < 8.19.12≥ 9.0.0, < 9.2.6+4 more2026-02-26
CVE-2026-26934 [MEDIUM] CWE-1284 CVE-2026-26934: Improper Validation of Specified Quantity in Input (CWE-1284) in Kibana can allow an authenticated a Improper Validation of Specified Quantity in Input (CWE-1284) in Kibana can allow an authenticated attacker with view-only privileges to cause a Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted, malformed payload causing excessive resource consumption and resulting in Kibana becoming unresponsive o
cvelistv5nvd
CVE-2026-0532HIGHCVSS 8.6≥ 8.15.0, ≤ 8.19.9≥ 9.0.0, ≤ 9.1.9+1 more2026-01-14
CVE-2026-0532 [HIGH] CWE-918 CVE-2026-0532: External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) c External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modif
cvelistv5nvd
CVE-2026-0528HIGHCVSS 7.5≥ 7.0.0, < 7.17.29≥ 8.0.0, < 8.19.10+2 more2026-01-13
CVE-2026-0528 [HIGH] CWE-129 CVE-2026-0528: Improper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a D Improper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed payloads sent to the Graphite server metricset or Zookeeper server metricset. Additionally, Improper Input Validation (CWE-20) exists in the Prometheus helper mo
nvd
CVE-2026-0530MEDIUMCVSS 6.5≥ 7.10.0, < 7.17.29≥ 8.0.0, < 8.19.10+6 more2026-01-13
CVE-2026-0530 [MEDIUM] CWE-770 CVE-2026-0530: Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted request. This causes the application to perform redundant processing operations that continuously consume system resources until service degradation or complete unavailability occurs.
cvelistv5nvd
CVE-2026-0531MEDIUMCVSS 6.5≥ 7.10.0, < 7.17.29≥ 8.0.0, < 8.19.10+6 more2026-01-13
CVE-2026-0531 [MEDIUM] CWE-770 CVE-2026-0531: Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted bulk retrieval request. This requires an attacker to have low-level privileges equivalent to the viewer role, which grants read access to agent policies. The crafted request can cause the application to pe
cvelistv5nvd
CVE-2026-0543MEDIUMCVSS 6.5≥ 7.0.0, ≤ 7.17.29≥ 8.0.0, < 8.19.0+5 more2026-01-13
CVE-2026-0543 [MEDIUM] CWE-20 CVE-2026-0543: Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Exc Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially cr
cvelistv5nvd
CVE-2025-68389MEDIUMCVSS 6.5≥ 7.0.0, ≤ 7.17.29≥ 8.0.0, < 8.19.9+5 more2025-12-18
CVE-2025-68389 [MEDIUM] CWE-770 CVE-2025-68389: Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request.
cvelistv5nvd
CVE-2025-68422MEDIUMCVSS 4.3≥ 7.0.0, ≤ 7.17.29≥ 8.0.0, < 8.19.7+5 more2025-12-18
CVE-2025-68422 [MEDIUM] CWE-863 CVE-2025-68422: Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries.
cvelistv5nvd
CVE-2025-68386MEDIUMCVSS 4.3≥ 7.0.0, ≤ 7.17.29≥ 8.0.0, < 8.19.8+5 more2025-12-18
CVE-2025-68386 [MEDIUM] CWE-863 CVE-2025-68386: Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to change a document's sharing type to "global," even though they do not have permission to do so, making it visible to everyone in the space via a crafted a HTTP request.
cvelistv5nvd
Elastic Kibana vulnerabilities | cvebase