CVE-2025-25015
- EPSS 0.7%
- Published 05.03.2025 10:15:20
- Last modified 02.10.2025 17:53:04
Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 ...
CVE-2024-43708
- EPSS 0.16%
- Published 23.01.2025 11:15:10
- Last modified 30.09.2025 20:56:18
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted payload to a number of inputs in Kibana UI. This can be carried out by users with read access to any feature in Kibana.
CVE-2024-52972
- EPSS 0.1%
- Published 23.01.2025 07:15:08
- Last modified 30.09.2025 20:57:56
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in K...
CVE-2024-43710
- EPSS 0.06%
- Published 23.01.2025 06:15:27
- Last modified 30.09.2025 20:58:49
A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that ret...
CVE-2024-43707
- EPSS 0.09%
- Published 23.01.2025 06:15:27
- Last modified 30.09.2025 20:59:28
An issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and the...
CVE-2024-52973
- EPSS 0.18%
- Published 21.01.2025 11:15:10
- Last modified 30.09.2025 21:01:56
An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/log_entries/summary. This can be carried out by users with read access to the Observability-Logs feature in Kibana.
CVE-2024-37285
- EPSS 3.02%
- Published 14.11.2024 17:15:06
- Last modified 01.10.2025 18:36:35
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific Elasticsearch ind...
CVE-2024-37288
- EPSS 0.89%
- Published 09.09.2024 09:15:02
- Last modified 16.09.2024 13:29:06
A deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Security’s built-in AI tools https://www.elastic.co/gui...
CVE-2024-37287
- EPSS 0.63%
- Published 13.08.2024 12:15:06
- Last modified 22.08.2024 13:33:12
A flaw allowing arbitrary code execution was discovered in Kibana. An attacker with access to ML and Alerting connector features, as well as write access to internal ML indices can trigger a prototype pollution vulnerability, ultimately leading to ar...
CVE-2024-37281
- EPSS 0.39%
- Published 30.07.2024 22:15:01
- Last modified 29.09.2025 14:09:44
An issue was discovered in Kibana where a user with Viewer role could cause a Kibana instance to crash by sending a large number of maliciously crafted requests to a specific endpoint.