Elastic Logstash vulnerabilities
16 known vulnerabilities affecting elastic/logstash.
Total CVEs
16
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH8MEDIUM6LOW1
Vulnerabilities
Page 1 of 1
CVE-2026-33466HIGHCVSS 8.1≥ 8.0.0, ≤ 8.19.132026-04-08
CVE-2026-33466 [HIGH] CWE-22 CVE-2026-33466: Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitra
Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139). The archive extraction utilities used by Logstash do not properly validate file paths within compressed archives. An attacker who can serve a specially crafted a
cvelistv5nvd
CVE-2025-37730MEDIUMCVSS 6.5≥ 8.0.0, < 8.17.6≥ 8.18.0, < 8.18.1+1 more2025-05-06
CVE-2025-37730 [MEDIUM] CWE-295 CVE-2025-37730: Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) at
Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
cvelistv5nvd
CVE-2023-46672MEDIUMCVSS 5.5≥ 8.10.0, < 8.11.1v7.12.12023-11-15
CVE-2023-46672 [MEDIUM] CWE-532 CVE-2023-46672: An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under
An issue was identified by Elastic whereby sensitive information is recorded in Logstash logs under specific circumstances.
The prerequisites for the manifestation of this issue are:
* Logstash is configured to log in JSON format https://www.elastic.co/guide/en/logstash/current/running-logstash-command-line.html , which is not the default logging f
cvelistv5nvd
CVE-2021-22138LOWCVSS 3.7≥ 6.4.0, < 6.8.15≥ 7.0.0, < 7.12.02021-05-13
CVE-2021-22138 [LOW] CWE-295 CVE-2021-22138: In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was
In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring da
nvd
CVE-2019-7620HIGHCVSS 7.5≥ 6.0.0, < 6.8.4≥ 7.0.0, < 7.4.1+1 more2019-10-30
CVE-2019-7620 [HIGH] CWE-400 CVE-2019-7620: Logstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats inpu
Logstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats input plugin. An unauthenticated user who is able to connect to the port the Logstash beats input could send a specially crafted network packet that would cause Logstash to stop responding.
cvelistv5nvd
CVE-2019-7612CRITICALCVSS 9.8fixed in 5.6.15≥ 6.0.0, < 6.6.1+1 more2019-03-25
CVE-2019-7612 [CRITICAL] CWE-209 CVE-2019-7612: A sensitive data disclosure flaw was found in the way Logstash versions before 5.6.15 and 6.6.1 logs
A sensitive data disclosure flaw was found in the way Logstash versions before 5.6.15 and 6.6.1 logs malformed URLs. If a malformed URL is specified as part of the Logstash configuration, the credentials for the URL could be inadvertently logged as part of the error message.
cvelistv5nvd
CVE-2019-7613HIGHCVSS 7.5vbefore 5.6.16 and 6.6.22019-03-25
CVE-2019-7613 [HIGH] CWE-778 CVE-2019-7613: Winlogbeat versions before 5.6.16 and 6.6.2 had an insufficient logging flaw. An attacker able to in
Winlogbeat versions before 5.6.16 and 6.6.2 had an insufficient logging flaw. An attacker able to inject certain characters into a log entry could prevent Winlogbeat from recording the event.
cvelistv5nvd
CVE-2018-3817MEDIUMCVSS 6.5fixed in 5.6.6≥ 6.0.0, < 6.1.2+1 more2018-03-30
CVE-2018-3817 [MEDIUM] CWE-532 CVE-2018-3817: When logging warnings regarding deprecated settings, Logstash before 5.6.6 and 6.x before 6.1.2 coul
When logging warnings regarding deprecated settings, Logstash before 5.6.6 and 6.x before 6.1.2 could inadvertently log sensitive information.
cvelistv5nvd
CVE-2015-5619MEDIUMCVSS 5.9v1.4.0v1.4.1+1 more2017-08-09
CVE-2015-5619 [MEDIUM] CWE-295 CVE-2015-5619: Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder
Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack.
nvd
CVE-2015-5378HIGHCVSS 7.5v1.4.0v1.4.1+1 more2017-06-27
CVE-2015-5378 [HIGH] CWE-200 CVE-2015-5378: Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications be
Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server.
nvd
CVE-2016-1000221HIGHCVSS 7.5≤ 2.3.32017-06-16
CVE-2016-1000221 [HIGH] CWE-200 CVE-2016-1000221: Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization he
Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information.
nvd
CVE-2016-10363HIGHCVSS 7.5≤ 2.3.2vbefore 2.3.32017-06-16
CVE-2016-10363 [HIGH] CWE-248 CVE-2016-10363: Logstash versions prior to 2.3.3, when using the Netflow Codec plugin, a remote attacker crafting ma
Logstash versions prior to 2.3.3, when using the Netflow Codec plugin, a remote attacker crafting malicious Netflow v5, Netflow v9 or IPFIX packets could perform a denial of service attack on the Logstash instance. The errors resulting from these crafted inputs are not handled by the codec and can cause the Logstash process to exit.
cvelistv5nvd
CVE-2016-1000222HIGHCVSS 7.5≤ 2.1.12017-06-16
CVE-2016-1000222 [HIGH] CWE-88 CVE-2016-1000222: Logstash prior to version 2.1.2, the CSV output can be attacked via engineered input that will creat
Logstash prior to version 2.1.2, the CSV output can be attacked via engineered input that will create malicious formulas in the CSV data.
nvd
CVE-2016-10362MEDIUMCVSS 6.5vbefore 5.0.12017-06-16
CVE-2016-10362 [MEDIUM] CWE-532 CVE-2016-10362: Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffin
Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffing, would log to file HTTP basic auth credentials.
cvelistv5nvd
CVE-2015-4152MEDIUMCVSS 6.4≤ 1.4.22015-06-15
CVE-2015-4152 [MEDIUM] CWE-22 CVE-2015-4152: Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 a
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
nvd
CVE-2014-4326HIGHCVSS 7.5v1.0.14v1.0.15+25 more2014-07-22
CVE-2014-4326 [HIGH] CWE-78 CVE-2014-4326: Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrar
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.
ghsanvdosv