Elastic Elastic Elastic

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Elastic product.

RSS Feeds for Elastic security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Elastic products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Elastic Sorted by Most Security Vulnerabilities since 2018

Elastic Kibana99 vulnerabilities

Elasticsearch48 vulnerabilities

Elastic Cloud Enterprise9 vulnerabilities

Elastic Logstash6 vulnerabilities

Elastic Enterprise Search5 vulnerabilities

Elastic Apm Server4 vulnerabilities

Elastic Endpoint Security3 vulnerabilities

Elastic Endgame2 vulnerabilities

Known Exploited Elastic Vulnerabilities

The following Elastic vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability The Groovy scripting engine in Elasticsearch allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands.
CVE-2015-1427 Exploit Probability: 92.3%
March 25, 2022
Elasticsearch Remote Code Execution Vulnerability Elasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code.
CVE-2014-3120 Exploit Probability: 85.6%
March 25, 2022
Kibana Arbitrary Code Execution Kibana contain an arbitrary code execution flaw in the Timelion visualizer.
CVE-2019-7609 Exploit Probability: 94.4%
January 10, 2022

Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.

By the Year

In 2026 there have been 16 vulnerabilities in Elastic with an average score of 6.5 out of ten. Last year, in 2025 Elastic had 41 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Elastic in 2026 could surpass last years number. Last year, the average CVE base score was greater by 0.21




Year Vulnerabilities Average Score
2026 16 6.51
2025 41 6.72
2024 19 6.44
2023 31 6.95
2022 11 5.66
2021 21 5.76
2020 13 6.10
2019 14 8.38
2018 20 7.11

It may take a day or so for new Elastic vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Elastic Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-26940 Mar 19, 2026
Kibana Timelion Plugin DOS via Overly Large Quantity Value Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantity value.
Kibana
CVE-2026-26939 Mar 19, 2026
Auth Bypass in Kibana Rule Management (CVE-2026-26939) Missing Authorization (CWE-862) in Kibanas server-side Detection Rule Management can lead to Unauthorized Endpoint Response Action Configuration (host isolation, process termination, and process suspension) via CAPEC-1 (Accessing Functionality Not Properly Constrained by ACLs). This requires an authenticated attacker with rule management privileges.
Kibana
CVE-2026-26933 Mar 19, 2026
CVE-2026-26933: Packetbeat OOB Read via Malformed Network Packets Improper Validation of Array Index (CWE-129) in multiple protocol parser components in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker with the ability to send specially crafted, malformed network packets to a monitored network interface can trigger out-of-bounds read operations, resulting in application crashes or resource exhaustion. This requires the attacker to be positioned on the same network segment as the Packetbeat deployment or to control traffic routed to monitored interfaces.
CVE-2026-26931 Mar 19, 2026
Metricbeat Remote_write Handler: Excessive Size Value Causing DoS Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130).
CVE-2026-26938 Feb 26, 2026
Elastic Kibana Workflows RCE via ServerSide Template Injection Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.
Kibana
CVE-2026-26937 Feb 26, 2026
Kibana Timelion Uncontrolled Res. Consumption (CWE-400) Uncontrolled Resource Consumption (CWE-400) in the Timelion component in Kibana can lead Denial of Service via Input Data Manipulation (CAPEC-153)
Kibana
CVE-2026-26936 Feb 26, 2026
Kibana AI Inference Engine DoS via Regex Blowup Inefficient Regular Expression Complexity (CWE-1333) in the AI Inference Anonymization Engine in Kibana can lead Denial of Service via Regular Expression Exponential Blowup (CAPEC-492).
Kibana
CVE-2026-26935 Feb 26, 2026
Kibana DS via Improper Input Validation in Content Connectors Search Endpoint Improper Input Validation (CWE-20) in the internal Content Connectors search endpoint in Kibana can lead Denial of Service via Input Data Manipulation (CAPEC-153)
Kibana
CVE-2026-26934 Feb 26, 2026
Kibana DoS via Improper Quantity Validation Improper Validation of Specified Quantity in Input (CWE-1284) in Kibana can allow an authenticated attacker with view-only privileges to cause a Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted, malformed payload causing excessive resource consumption and resulting in Kibana becoming unresponsive or crashing.
Kibana
CVE-2026-26932 Feb 26, 2026
Packetbeat GO: Array Index Validation Flaw Enables DoS via Packet Poisoning Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port.
CVE-2026-0532 Jan 14, 2026
Elastic Security: External Path & SSRF File Disclosure External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modify connectors (Alerts & Connectors: All). The server processes a configuration without proper validation, allowing for arbitrary network requests and for arbitrary file reads.
Kibana
CVE-2026-0529 Jan 14, 2026
Packetbeats MongoDB Protocol Parser Array Index Validation Bypass Improper Validation of Array Index (CWE-129) in Packetbeats MongoDB protocol parser can allow an attacker to cause Overflow Buffers (CAPEC-100) through specially crafted network traffic. This requires an attacker to send a malformed payload to a monitored network interface where MongoDB protocol parsing is enabled.
CVE-2026-0543 Jan 13, 2026
Kibana Email Connector CVE-2026-0543: Improper Input Validation (CWE-20) Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed.
Kibana
CVE-2026-0531 Jan 13, 2026
Elastic Kibana Fleet: Memory Exhaustion via Bulk Retrieval (CWE-770) Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted bulk retrieval request. This requires an attacker to have low-level privileges equivalent to the viewer role, which grants read access to agent policies. The crafted request can cause the application to perform redundant database retrieval operations that immediately consume memory until the server crashes and becomes unavailable to all users.
Kibana
CVE-2026-0530 Jan 13, 2026
Kibana Fleet Resource Exhaustion via Crafted Request (CVE-2026-0530) Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted request. This causes the application to perform redundant processing operations that continuously consume system resources until service degradation or complete unavailability occurs.
Kibana
CVE-2026-0528 Jan 13, 2026
Metricbeat Improper Array Index Validation allowing DoS via Graphite/Zookeeper Improper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed payloads sent to the Graphite server metricset or Zookeeper server metricset. Additionally, Improper Input Validation (CWE-20) exists in the Prometheus helper module that can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed metric data.
CVE-2025-68422 Dec 18, 2025
Kibana Privilege Escalation via AuthBypass HTTP Request (CVE-2025-68422) Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries.
Kibana
CVE-2025-68386 Dec 18, 2025
Kibana: Improper Auth Enables Global Document Sharing (CWE-285) Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to change a document's sharing type to "global," even though they do not have permission to do so, making it visible to everyone in the space via a crafted a HTTP request.
Kibana
CVE-2025-68390 Dec 18, 2025
Elasticsearch Excessive Memory Allocation via Snapshot Restore (DoS) Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request.
Elasticsearch
CVE-2025-68389 Dec 18, 2025
Kibana Resource Leak: Authenticated DoS via Crafted HTTP (CVE-2025-68389) Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request.
Kibana
CVE-2025-68387 Dec 18, 2025
Vega XSS via Vulnerable AST Evaluator Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an unauthenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a vulnerability a function handler in the Vega AST evaluator.
Kibana
CVE-2025-68385 Dec 18, 2025
Vega XSS via Input Neutralization Bypass (CVE-2025-68385) Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a method in Vega bypassing a previous Vega XSS mitigation.
Kibana
CVE-2025-68384 Dec 18, 2025
Elasticsearch OOM DoS: Unrestricted User Settings Allocation Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) causing a persistent denial of service (OOM crash) via submission of oversized user settings data.
Elasticsearch
CVE-2025-68383 Dec 18, 2025
Filebeat Syslog/Dissect BUF Overflow via Malformed Msg/Tokenizer Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration.
CVE-2025-68382 Dec 18, 2025
NFS OOB Read Causing DoS (CVE-2025-68382) Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded RPC messages.
CVE-2025-68381 Dec 18, 2025
Packetbeat Buffer Overflow via Malformed UDP Packet (CWE-787) Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.
CVE-2025-68388 Dec 18, 2025
Packetbeat DoS: Resource Allocation via Malicious IPv4 Fragments (CWE-770) Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbeat.
CVE-2025-37731 Dec 15, 2025
Elasticsearch PKI Realm Improper Auth Leads to User Impersonation Improper Authentication in Elasticsearch PKI realm can lead to user impersonation via specially crafted client certificates. A malicious actor would need to have such a crafted client certificate signed by a legitimate, trusted Certificate Authority.
Elasticsearch
CVE-2025-37732 Dec 15, 2025
SAP Enterprise Portal Auth XSS via Integration Package Upload Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to render HTML tags within a users browser via the integration package upload functionality. This issue is related to ESA-2025-17 (CVE-2025-25018) bypassing that fix to achieve HTML injection.
Kibana
CVE-2025-37734 Nov 12, 2025
SSRF via Forged Origin Header in Kibana Observability AI Assistant Origin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant.
Kibana
CVE-2025-37736 Nov 07, 2025
Elastic CE improper auth allows privilege escalation via readonly APIs Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is: post:/platform/configuration/security/service-accounts delete:/platform/configuration/security/service-accounts/{user_id} patch:/platform/configuration/security/service-accounts/{user_id} post:/platform/configuration/security/service-accounts/{user_id}/keys delete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id} patch:/user post:/users post:/users/auth/keys delete:/users/auth/keys delete:/users/auth/keys/_all delete:/users/auth/keys/{api_key_id} delete:/users/{user_id}/auth/keys delete:/users/{user_id}/auth/keys/{api_key_id} delete:/users/{user_name} patch:/users/{user_name}
Elastic Cloud Enterprise
CVE-2025-37735 Nov 06, 2025
Elastic Defend WOS Improper Perm Preservation Enables File Deletion & LPE Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.
Kibana
CVE-2025-37729 Oct 13, 2025
CVE-2025-37729: ECE Jinjava Template Injection RCE Improper neutralization of special elements used in a template engine in Elastic Cloud Enterprise (ECE) can lead to a malicious actor with Admin access exfiltrating sensitive information and issuing commands via a specially crafted string where Jinjava variables are evaluated.
Elastic Cloud Enterprise
CVE-2025-37727 Oct 10, 2025
Elasticsearch: Sensitive Data Log Logging via reindex API (CVE-2025-37727) Insertion of sensitive information in log file in Elasticsearch can lead to loss of confidentiality under specific preconditions when auditing requests to the reindex API https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-reindex
Elasticsearch
CVE-2025-25017 Oct 10, 2025
Kibana XSS via Improper Input Neutralization in Web Page Generation Improper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS)
Kibana
CVE-2025-25018 Oct 10, 2025
Kibana Stored XSS due to Improper Input Neutralization Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)
Kibana
CVE-2025-25009 Oct 07, 2025
Kibana Stored XSS via Unescaped Inputs in Case File Upload Improper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload.
Kibana
CVE-2025-37728 Oct 07, 2025
Insuff. Protected Credentials in CrowdStrike Connector Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike connector in a space to which they have access.
Kibana
CVE-2025-25012 Jun 25, 2025
Kibana Open Redirect (CVE-2025-25012) URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL.
Kibana
CVE-2024-43706 Jun 10, 2025
Kibana Improper Auth: Privilege Abuse via Synthetic Monitor Improper authorization in Kibana can lead to privilege abuse via a direct HTTP request to a Synthetic monitor endpoint.
Kibana
CVE-2025-37730 May 06, 2025
Improper cert validation in Logstash TCP output (MitM) Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in client mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.
Logstash
CVE-2025-25014 May 06, 2025
Prototype Pollution in Kibana Enables Arbitrary Code Execution A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.
Kibana
CVE-2025-25016 May 01, 2025
Kibana Unrestricted File Upload CVE-2025-25016 Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted malicious file due to insufficient server-side validation.
Kibana
CVE-2024-52979 May 01, 2025
Elasticsearch DoS via Uncontrolled Resource Consumption in Mustache Templates Uncontrolled Resource Consumption in Elasticsearch while evaluating specifically crafted search templates with Mustache functions can lead to Denial of Service by causing the Elasticsearch node to crash.
Elasticsearch
CVE-2024-11994 May 01, 2025
Elastic APM Server Log Info Disclosure via Failed Bulk Index APM server logs could contain parts of the document body from a partially failed bulk index request. Depending on the nature of the document, this could disclose sensitive information in APM Server error logs.
Apm Server
CVE-2024-11390 May 01, 2025
Kibana Synthetics Unrestricted Upload Allows XSS via crafted files Unrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victims browser (XSS) via crafted HTML and JavaScript files. The attacker must have access to the Synthetics app AND/OR have access to write to the synthetics indices.
Kibana
CVE-2024-12556 Apr 08, 2025
Kibana Prototype Pollution Permits Code Exec via Unrestricted Upload & Path Trv Prototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal.
Kibana
CVE-2024-52974 Apr 08, 2025
Kibana Observability API Crash via Malicious Request (Read Access Required) An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them.
Kibana
CVE-2024-52981 Apr 08, 2025
Elasticsearch stack overflow via recursive GeometryCollection WKT An issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow.
Elasticsearch
CVE-2024-52980 Apr 08, 2025
Elasticsearch PatternBank Recursion Crash Exploitable with read_pipeline A flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash. A successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privilege assigned to them.
Elasticsearch
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.