Elastic

Kibana

79 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS -
  • Published 07.10.2025 13:59:00
  • Last modified 07.10.2025 14:15:36

Improper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload.

  • EPSS -
  • Published 07.10.2025 13:54:49
  • Last modified 07.10.2025 16:15:54

Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike con...

  • EPSS 0.04%
  • Published 28.08.2025 15:52:08
  • Last modified 01.10.2025 18:45:24

Incorrect authorization in Kibana can lead to privilege escalation via the built-in reporting_user role which incorrectly has the ability to access all Kibana Spaces.

  • EPSS 0.05%
  • Published 25.06.2025 11:52:53
  • Last modified 30.09.2025 20:27:39

URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL.

  • EPSS 0.06%
  • Published 10.06.2025 16:59:54
  • Last modified 01.10.2025 15:27:00

Improper authorization in Kibana can lead to privilege abuse via a direct HTTP request to a Synthetic monitor endpoint.

  • EPSS 0.33%
  • Published 06.05.2025 17:30:45
  • Last modified 02.10.2025 16:26:53

A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.

  • EPSS 0.03%
  • Published 01.05.2025 13:11:14
  • Last modified 01.10.2025 19:29:57

Unrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victim’s browser (XSS) via crafted HTML and JavaScript files. The attacker must have access to the Synthetics app AND/OR have access to write...

  • EPSS 0.03%
  • Published 01.05.2025 13:09:16
  • Last modified 02.10.2025 16:34:04

Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted malicious file due to insufficient server-side validation.

  • EPSS 0.27%
  • Published 08.04.2025 20:15:19
  • Last modified 02.10.2025 15:27:30

Prototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal.

  • EPSS 0.05%
  • Published 08.04.2025 16:46:44
  • Last modified 30.09.2025 21:36:21

An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them.