Elastic Elastic
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Elastic product.
RSS Feeds for Elastic security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Elastic products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Elastic Sorted by Most Security Vulnerabilities since 2018
Known Exploited Elastic Vulnerabilities
The following Elastic vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability |
The Groovy scripting engine in Elasticsearch allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands. CVE-2015-1427 Exploit Probability: 92.3% |
March 25, 2022 |
| Elasticsearch Remote Code Execution Vulnerability |
Elasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code. CVE-2014-3120 Exploit Probability: 85.6% |
March 25, 2022 |
| Kibana Arbitrary Code Execution |
Kibana contain an arbitrary code execution flaw in the Timelion visualizer. CVE-2019-7609 Exploit Probability: 94.4% |
January 10, 2022 |
Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 16 vulnerabilities in Elastic with an average score of 6.5 out of ten. Last year, in 2025 Elastic had 41 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Elastic in 2026 could surpass last years number. Last year, the average CVE base score was greater by 0.21
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 16 | 6.51 |
| 2025 | 41 | 6.72 |
| 2024 | 19 | 6.44 |
| 2023 | 31 | 6.95 |
| 2022 | 11 | 5.66 |
| 2021 | 21 | 5.76 |
| 2020 | 13 | 6.10 |
| 2019 | 14 | 8.38 |
| 2018 | 20 | 7.11 |
It may take a day or so for new Elastic vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Elastic Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-26940 | Mar 19, 2026 |
Kibana Timelion Plugin DOS via Overly Large Quantity ValueImproper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantity value. |
|
| CVE-2026-26939 | Mar 19, 2026 |
Auth Bypass in Kibana Rule Management (CVE-2026-26939)Missing Authorization (CWE-862) in Kibanas server-side Detection Rule Management can lead to Unauthorized Endpoint Response Action Configuration (host isolation, process termination, and process suspension) via CAPEC-1 (Accessing Functionality Not Properly Constrained by ACLs). This requires an authenticated attacker with rule management privileges. |
|
| CVE-2026-26933 | Mar 19, 2026 |
CVE-2026-26933: Packetbeat OOB Read via Malformed Network PacketsImproper Validation of Array Index (CWE-129) in multiple protocol parser components in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker with the ability to send specially crafted, malformed network packets to a monitored network interface can trigger out-of-bounds read operations, resulting in application crashes or resource exhaustion. This requires the attacker to be positioned on the same network segment as the Packetbeat deployment or to control traffic routed to monitored interfaces. |
|
| CVE-2026-26931 | Mar 19, 2026 |
Metricbeat Remote_write Handler: Excessive Size Value Causing DoSMemory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130). |
|
| CVE-2026-26938 | Feb 26, 2026 |
Elastic Kibana Workflows RCE via ServerSide Template InjectionImproper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege. |
|
| CVE-2026-26937 | Feb 26, 2026 |
Kibana Timelion Uncontrolled Res. Consumption (CWE-400)Uncontrolled Resource Consumption (CWE-400) in the Timelion component in Kibana can lead Denial of Service via Input Data Manipulation (CAPEC-153) |
|
| CVE-2026-26936 | Feb 26, 2026 |
Kibana AI Inference Engine DoS via Regex BlowupInefficient Regular Expression Complexity (CWE-1333) in the AI Inference Anonymization Engine in Kibana can lead Denial of Service via Regular Expression Exponential Blowup (CAPEC-492). |
|
| CVE-2026-26935 | Feb 26, 2026 |
Kibana DS via Improper Input Validation in Content Connectors Search EndpointImproper Input Validation (CWE-20) in the internal Content Connectors search endpoint in Kibana can lead Denial of Service via Input Data Manipulation (CAPEC-153) |
|
| CVE-2026-26934 | Feb 26, 2026 |
Kibana DoS via Improper Quantity ValidationImproper Validation of Specified Quantity in Input (CWE-1284) in Kibana can allow an authenticated attacker with view-only privileges to cause a Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted, malformed payload causing excessive resource consumption and resulting in Kibana becoming unresponsive or crashing. |
|
| CVE-2026-26932 | Feb 26, 2026 |
Packetbeat GO: Array Index Validation Flaw Enables DoS via Packet PoisoningImproper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port. |
|
| CVE-2026-0532 | Jan 14, 2026 |
Elastic Security: External Path & SSRF File DisclosureExternal Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modify connectors (Alerts & Connectors: All). The server processes a configuration without proper validation, allowing for arbitrary network requests and for arbitrary file reads. |
|
| CVE-2026-0529 | Jan 14, 2026 |
Packetbeats MongoDB Protocol Parser Array Index Validation BypassImproper Validation of Array Index (CWE-129) in Packetbeats MongoDB protocol parser can allow an attacker to cause Overflow Buffers (CAPEC-100) through specially crafted network traffic. This requires an attacker to send a malformed payload to a monitored network interface where MongoDB protocol parsing is enabled. |
|
| CVE-2026-0543 | Jan 13, 2026 |
Kibana Email Connector CVE-2026-0543: Improper Input Validation (CWE-20)Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed. |
|
| CVE-2026-0531 | Jan 13, 2026 |
Elastic Kibana Fleet: Memory Exhaustion via Bulk Retrieval (CWE-770)Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted bulk retrieval request. This requires an attacker to have low-level privileges equivalent to the viewer role, which grants read access to agent policies. The crafted request can cause the application to perform redundant database retrieval operations that immediately consume memory until the server crashes and becomes unavailable to all users. |
|
| CVE-2026-0530 | Jan 13, 2026 |
Kibana Fleet Resource Exhaustion via Crafted Request (CVE-2026-0530)Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted request. This causes the application to perform redundant processing operations that continuously consume system resources until service degradation or complete unavailability occurs. |
|
| CVE-2026-0528 | Jan 13, 2026 |
Metricbeat Improper Array Index Validation allowing DoS via Graphite/ZookeeperImproper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed payloads sent to the Graphite server metricset or Zookeeper server metricset. Additionally, Improper Input Validation (CWE-20) exists in the Prometheus helper module that can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed metric data. |
|
| CVE-2025-68422 | Dec 18, 2025 |
Kibana Privilege Escalation via AuthBypass HTTP Request (CVE-2025-68422)Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries. |
|
| CVE-2025-68386 | Dec 18, 2025 |
Kibana: Improper Auth Enables Global Document Sharing (CWE-285)Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to change a document's sharing type to "global," even though they do not have permission to do so, making it visible to everyone in the space via a crafted a HTTP request. |
|
| CVE-2025-68390 | Dec 18, 2025 |
Elasticsearch Excessive Memory Allocation via Snapshot Restore (DoS)Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request. |
|
| CVE-2025-68389 | Dec 18, 2025 |
Kibana Resource Leak: Authenticated DoS via Crafted HTTP (CVE-2025-68389)Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request. |
|
| CVE-2025-68387 | Dec 18, 2025 |
Vega XSS via Vulnerable AST EvaluatorImproper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an unauthenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a vulnerability a function handler in the Vega AST evaluator. |
|
| CVE-2025-68385 | Dec 18, 2025 |
Vega XSS via Input Neutralization Bypass (CVE-2025-68385)Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a method in Vega bypassing a previous Vega XSS mitigation. |
|
| CVE-2025-68384 | Dec 18, 2025 |
Elasticsearch OOM DoS: Unrestricted User Settings AllocationAllocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) causing a persistent denial of service (OOM crash) via submission of oversized user settings data. |
|
| CVE-2025-68383 | Dec 18, 2025 |
Filebeat Syslog/Dissect BUF Overflow via Malformed Msg/TokenizerImproper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration. |
|
| CVE-2025-68382 | Dec 18, 2025 |
NFS OOB Read Causing DoS (CVE-2025-68382)Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded RPC messages. |
|
| CVE-2025-68381 | Dec 18, 2025 |
Packetbeat Buffer Overflow via Malformed UDP Packet (CWE-787)Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number. |
|
| CVE-2025-68388 | Dec 18, 2025 |
Packetbeat DoS: Resource Allocation via Malicious IPv4 Fragments (CWE-770)Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbeat. |
|
| CVE-2025-37731 | Dec 15, 2025 |
Elasticsearch PKI Realm Improper Auth Leads to User ImpersonationImproper Authentication in Elasticsearch PKI realm can lead to user impersonation via specially crafted client certificates. A malicious actor would need to have such a crafted client certificate signed by a legitimate, trusted Certificate Authority. |
|
| CVE-2025-37732 | Dec 15, 2025 |
SAP Enterprise Portal Auth XSS via Integration Package UploadImproper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to render HTML tags within a users browser via the integration package upload functionality. This issue is related to ESA-2025-17 (CVE-2025-25018) bypassing that fix to achieve HTML injection. |
|
| CVE-2025-37734 | Nov 12, 2025 |
SSRF via Forged Origin Header in Kibana Observability AI AssistantOrigin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant. |
|
| CVE-2025-37736 | Nov 07, 2025 |
Elastic CE improper auth allows privilege escalation via readonly APIsImproper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is: post:/platform/configuration/security/service-accounts delete:/platform/configuration/security/service-accounts/{user_id} patch:/platform/configuration/security/service-accounts/{user_id} post:/platform/configuration/security/service-accounts/{user_id}/keys delete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id} patch:/user post:/users post:/users/auth/keys delete:/users/auth/keys delete:/users/auth/keys/_all delete:/users/auth/keys/{api_key_id} delete:/users/{user_id}/auth/keys delete:/users/{user_id}/auth/keys/{api_key_id} delete:/users/{user_name} patch:/users/{user_name} |
|
| CVE-2025-37735 | Nov 06, 2025 |
Elastic Defend WOS Improper Perm Preservation Enables File Deletion & LPEImproper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation. |
|
| CVE-2025-37729 | Oct 13, 2025 |
CVE-2025-37729: ECE Jinjava Template Injection RCEImproper neutralization of special elements used in a template engine in Elastic Cloud Enterprise (ECE) can lead to a malicious actor with Admin access exfiltrating sensitive information and issuing commands via a specially crafted string where Jinjava variables are evaluated. |
|
| CVE-2025-37727 | Oct 10, 2025 |
Elasticsearch: Sensitive Data Log Logging via reindex API (CVE-2025-37727)Insertion of sensitive information in log file in Elasticsearch can lead to loss of confidentiality under specific preconditions when auditing requests to the reindex API https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-reindex |
|
| CVE-2025-25017 | Oct 10, 2025 |
Kibana XSS via Improper Input Neutralization in Web Page GenerationImproper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS) |
|
| CVE-2025-25018 | Oct 10, 2025 |
Kibana Stored XSS due to Improper Input NeutralizationImproper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS) |
|
| CVE-2025-25009 | Oct 07, 2025 |
Kibana Stored XSS via Unescaped Inputs in Case File UploadImproper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload. |
|
| CVE-2025-37728 | Oct 07, 2025 |
Insuff. Protected Credentials in CrowdStrike ConnectorInsufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike connector in a space to which they have access. |
|
| CVE-2025-25012 | Jun 25, 2025 |
Kibana Open Redirect (CVE-2025-25012)URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL. |
|
| CVE-2024-43706 | Jun 10, 2025 |
Kibana Improper Auth: Privilege Abuse via Synthetic MonitorImproper authorization in Kibana can lead to privilege abuse via a direct HTTP request to a Synthetic monitor endpoint. |
|
| CVE-2025-37730 | May 06, 2025 |
Improper cert validation in Logstash TCP output (MitM)Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in client mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set. |
|
| CVE-2025-25014 | May 06, 2025 |
Prototype Pollution in Kibana Enables Arbitrary Code ExecutionA Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints. |
|
| CVE-2025-25016 | May 01, 2025 |
Kibana Unrestricted File Upload CVE-2025-25016Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted malicious file due to insufficient server-side validation. |
|
| CVE-2024-52979 | May 01, 2025 |
Elasticsearch DoS via Uncontrolled Resource Consumption in Mustache TemplatesUncontrolled Resource Consumption in Elasticsearch while evaluating specifically crafted search templates with Mustache functions can lead to Denial of Service by causing the Elasticsearch node to crash. |
|
| CVE-2024-11994 | May 01, 2025 |
Elastic APM Server Log Info Disclosure via Failed Bulk IndexAPM server logs could contain parts of the document body from a partially failed bulk index request. Depending on the nature of the document, this could disclose sensitive information in APM Server error logs. |
|
| CVE-2024-11390 | May 01, 2025 |
Kibana Synthetics Unrestricted Upload Allows XSS via crafted filesUnrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victims browser (XSS) via crafted HTML and JavaScript files. The attacker must have access to the Synthetics app AND/OR have access to write to the synthetics indices. |
|
| CVE-2024-12556 | Apr 08, 2025 |
Kibana Prototype Pollution Permits Code Exec via Unrestricted Upload & Path TrvPrototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal. |
|
| CVE-2024-52974 | Apr 08, 2025 |
Kibana Observability API Crash via Malicious Request (Read Access Required)An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them. |
|
| CVE-2024-52981 | Apr 08, 2025 |
Elasticsearch stack overflow via recursive GeometryCollection WKTAn issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow. |
|
| CVE-2024-52980 | Apr 08, 2025 |
Elasticsearch PatternBank Recursion Crash Exploitable with read_pipelineA flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash. A successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privilege assigned to them. |
|