Elastic Elastic
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Elastic product.
RSS Feeds for Elastic security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Elastic products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Elastic Sorted by Most Security Vulnerabilities since 2018
Known Exploited Elastic Vulnerabilities
The following Elastic vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability |
The Groovy scripting engine in Elasticsearch allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands. CVE-2015-1427 Exploit Probability: 92.3% |
March 25, 2022 |
| Elasticsearch Remote Code Execution Vulnerability |
Elasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code. CVE-2014-3120 Exploit Probability: 85.6% |
March 25, 2022 |
| Kibana Arbitrary Code Execution |
Kibana contain an arbitrary code execution flaw in the Timelion visualizer. CVE-2019-7609 Exploit Probability: 94.4% |
January 10, 2022 |
Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 6 vulnerabilities in Elastic with an average score of 6.9 out of ten. Last year, in 2025 Elastic had 41 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Elastic in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.32.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 6 | 6.85 |
| 2025 | 41 | 6.53 |
| 2024 | 19 | 6.44 |
| 2023 | 31 | 6.95 |
| 2022 | 11 | 5.66 |
| 2021 | 21 | 5.65 |
| 2020 | 6 | 6.80 |
| 2019 | 12 | 7.38 |
| 2018 | 20 | 7.11 |
It may take a day or so for new Elastic vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Elastic Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-0532 | Jan 14, 2026 |
External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) canExternal Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modify connectors (Alerts & Connectors: All). The server processes a configuration without proper validation, allowing for arbitrary network requests and for arbitrary file reads. |
|
| CVE-2026-0529 | Jan 14, 2026 |
Improper Validation of Array Index (CWE-129) in Packetbeats MongoDB protocol parser canImproper Validation of Array Index (CWE-129) in Packetbeats MongoDB protocol parser can allow an attacker to cause Overflow Buffers (CAPEC-100) through specially crafted network traffic. This requires an attacker to send a malformed payload to a monitored network interface where MongoDB protocol parsing is enabled. |
|
| CVE-2026-0543 | Jan 13, 2026 |
Improper Input Validation (CWE-20) in Kibana's Email Connector canImproper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed. |
|
| CVE-2026-0531 | Jan 13, 2026 |
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130)Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted bulk retrieval request. This requires an attacker to have low-level privileges equivalent to the viewer role, which grants read access to agent policies. The crafted request can cause the application to perform redundant database retrieval operations that immediately consume memory until the server crashes and becomes unavailable to all users. |
|
| CVE-2026-0530 | Jan 13, 2026 |
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130)Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana Fleet can lead to Excessive Allocation (CAPEC-130) via a specially crafted request. This causes the application to perform redundant processing operations that continuously consume system resources until service degradation or complete unavailability occurs. |
|
| CVE-2026-0528 | Jan 13, 2026 |
Improper Validation of Array Index (CWE-129) exists in Metricbeat canImproper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed payloads sent to the Graphite server metricset or Zookeeper server metricset. Additionally, Improper Input Validation (CWE-20) exists in the Prometheus helper module that can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed metric data. |
|
| CVE-2025-68422 | Dec 18, 2025 |
Kibana Privilege Escalation via AuthBypass HTTP Request (CVE-2025-68422)Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries. |
|
| CVE-2025-68386 | Dec 18, 2025 |
Kibana: Improper Auth Enables Global Document Sharing (CWE-285)Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to change a document's sharing type to "global," even though they do not have permission to do so, making it visible to everyone in the space via a crafted a HTTP request. |
|
| CVE-2025-68390 | Dec 18, 2025 |
Elasticsearch Excessive Memory Allocation via Snapshot Restore (DoS)Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request. |
|
| CVE-2025-68389 | Dec 18, 2025 |
Kibana Resource Leak: Authenticated DoS via Crafted HTTP (CVE-2025-68389)Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request. |
|
| CVE-2025-68387 | Dec 18, 2025 |
Vega XSS via Vulnerable AST EvaluatorImproper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an unauthenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a vulnerability a function handler in the Vega AST evaluator. |
|
| CVE-2025-68385 | Dec 18, 2025 |
Vega XSS via Input Neutralization Bypass (CVE-2025-68385)Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a method in Vega bypassing a previous Vega XSS mitigation. |
|
| CVE-2025-68384 | Dec 18, 2025 |
Elasticsearch OOM DoS: Unrestricted User Settings AllocationAllocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) causing a persistent denial of service (OOM crash) via submission of oversized user settings data. |
|
| CVE-2025-68383 | Dec 18, 2025 |
Filebeat Syslog/Dissect BUF Overflow via Malformed Msg/TokenizerImproper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration. |
|
| CVE-2025-68382 | Dec 18, 2025 |
NFS OOB Read Causing DoS (CVE-2025-68382)Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded RPC messages. |
|
| CVE-2025-68381 | Dec 18, 2025 |
Packetbeat Buffer Overflow via Malformed UDP Packet (CWE-787)Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number. |
|
| CVE-2025-68388 | Dec 18, 2025 |
Packetbeat DoS: Resource Allocation via Malicious IPv4 Fragments (CWE-770)Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbeat. |
|
| CVE-2025-37731 | Dec 15, 2025 |
Elasticsearch PKI Realm Improper Auth Leads to User ImpersonationImproper Authentication in Elasticsearch PKI realm can lead to user impersonation via specially crafted client certificates. A malicious actor would need to have such a crafted client certificate signed by a legitimate, trusted Certificate Authority. |
|
| CVE-2025-37732 | Dec 15, 2025 |
SAP Enterprise Portal Auth XSS via Integration Package UploadImproper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to render HTML tags within a users browser via the integration package upload functionality. This issue is related to ESA-2025-17 (CVE-2025-25018) bypassing that fix to achieve HTML injection. |
|
| CVE-2025-37734 | Nov 12, 2025 |
SSRF via Forged Origin Header in Kibana Observability AI AssistantOrigin Validation Error in Kibana can lead to Server-Side Request Forgery via a forged Origin HTTP header processed by the Observability AI Assistant. |
|
| CVE-2025-37736 | Nov 07, 2025 |
Elastic CE improper auth allows privilege escalation via readonly APIsImproper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is: post:/platform/configuration/security/service-accounts delete:/platform/configuration/security/service-accounts/{user_id} patch:/platform/configuration/security/service-accounts/{user_id} post:/platform/configuration/security/service-accounts/{user_id}/keys delete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id} patch:/user post:/users post:/users/auth/keys delete:/users/auth/keys delete:/users/auth/keys/_all delete:/users/auth/keys/{api_key_id} delete:/users/{user_id}/auth/keys delete:/users/{user_id}/auth/keys/{api_key_id} delete:/users/{user_name} patch:/users/{user_name} |
|
| CVE-2025-37735 | Nov 06, 2025 |
Elastic Defend WOS Improper Perm Preservation Enables File Deletion & LPEImproper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation. |
|
| CVE-2025-37729 | Oct 13, 2025 |
CVE-2025-37729: ECE Jinjava Template Injection RCEImproper neutralization of special elements used in a template engine in Elastic Cloud Enterprise (ECE) can lead to a malicious actor with Admin access exfiltrating sensitive information and issuing commands via a specially crafted string where Jinjava variables are evaluated. |
|
| CVE-2025-37727 | Oct 10, 2025 |
Elasticsearch: Sensitive Data Log Logging via reindex API (CVE-2025-37727)Insertion of sensitive information in log file in Elasticsearch can lead to loss of confidentiality under specific preconditions when auditing requests to the reindex API https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-reindex |
|
| CVE-2025-25017 | Oct 10, 2025 |
Kibana XSS via Improper Input Neutralization in Web Page GenerationImproper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS) |
|
| CVE-2025-25018 | Oct 10, 2025 |
Kibana Stored XSS due to Improper Input NeutralizationImproper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS) |
|
| CVE-2025-25009 | Oct 07, 2025 |
Kibana Stored XSS via Unescaped Inputs in Case File UploadImproper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload. |
|
| CVE-2025-37728 | Oct 07, 2025 |
Insuff. Protected Credentials in CrowdStrike ConnectorInsufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike connector in a space to which they have access. |
|
| CVE-2025-25012 | Jun 25, 2025 |
Kibana Open Redirect (CVE-2025-25012)URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL. |
|
| CVE-2024-43706 | Jun 10, 2025 |
Kibana Improper Auth: Privilege Abuse via Synthetic MonitorImproper authorization in Kibana can lead to privilege abuse via a direct HTTP request to a Synthetic monitor endpoint. |
|
| CVE-2025-37730 | May 06, 2025 |
Improper cert validation in Logstash TCP output (MitM)Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in client mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set. |
|
| CVE-2025-25014 | May 06, 2025 |
Prototype Pollution in Kibana Enables Arbitrary Code ExecutionA Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints. |
|
| CVE-2025-25016 | May 01, 2025 |
Kibana Unrestricted File Upload CVE-2025-25016Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted malicious file due to insufficient server-side validation. |
|
| CVE-2024-52979 | May 01, 2025 |
Elasticsearch DoS via Uncontrolled Resource Consumption in Mustache TemplatesUncontrolled Resource Consumption in Elasticsearch while evaluating specifically crafted search templates with Mustache functions can lead to Denial of Service by causing the Elasticsearch node to crash. |
|
| CVE-2024-11994 | May 01, 2025 |
Elastic APM Server Log Info Disclosure via Failed Bulk IndexAPM server logs could contain parts of the document body from a partially failed bulk index request. Depending on the nature of the document, this could disclose sensitive information in APM Server error logs. |
|
| CVE-2024-11390 | May 01, 2025 |
Kibana Synthetics Unrestricted Upload Allows XSS via crafted filesUnrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victims browser (XSS) via crafted HTML and JavaScript files. The attacker must have access to the Synthetics app AND/OR have access to write to the synthetics indices. |
|
| CVE-2024-12556 | Apr 08, 2025 |
Kibana Prototype Pollution Permits Code Exec via Unrestricted Upload & Path TrvPrototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal. |
|
| CVE-2024-52974 | Apr 08, 2025 |
Kibana Observability API Crash via Malicious Request (Read Access Required)An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them. |
|
| CVE-2024-52980 | Apr 08, 2025 |
Elasticsearch PatternBank Recursion Crash Exploitable with read_pipelineA flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash. A successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privilege assigned to them. |
|
| CVE-2024-52981 | Apr 08, 2025 |
Elasticsearch stack overflow via recursive GeometryCollection WKTAn issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow. |
|
| CVE-2025-25015 | Mar 05, 2025 |
Kibana 8.15-8.17 Prototype Pollution -> Arbitrary Code Exec via Crafted UploadPrototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors |
|
| CVE-2024-43708 | Jan 23, 2025 |
Kibana Resource Exhaustion via UI Payload (CVE-2024-43708)An allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted payload to a number of inputs in Kibana UI. This can be carried out by users with read access to any feature in Kibana. |
|
| CVE-2024-52972 | Jan 23, 2025 |
Kibana: Unbounded Resource Allocation Crash via /api/metrics/snapshotAn allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/metrics/snapshot. This can be carried out by users with read access to the Observability Metrics or Logs features in Kibana. |
|
| CVE-2024-43710 | Jan 23, 2025 |
CVE-2024-43710: SSRF via Kibana Fleet /api/health_check APIA server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet. |
|
| CVE-2024-43707 | Jan 23, 2025 |
Kibana: Fleet Policy Leakage to Unauthorized UsersAn issue was identified in Kibana where a user without access to Fleet can view Elastic Agent policies that could contain sensitive information. The nature of the sensitive information depends on the integrations enabled for the Elastic Agent and their respective versions. |
|
| CVE-2024-43709 | Jan 21, 2025 |
ElasticSearch: Unbounded Resource Allocation via SQL Query OOM CrashAn allocation of resources without limits or throttling in Elasticsearch can lead to an OutOfMemoryError exception resulting in a crash via a specially crafted query using an SQL function. |
|
| CVE-2024-52973 | Jan 21, 2025 |
Kibana Crash: Unlimited Resource Allocation via /api/log_entries/summaryAn allocation of resources without limits or throttling in Kibana can lead to a crash caused by a specially crafted request to /api/log_entries/summary. This can be carried out by users with read access to the Observability-Logs feature in Kibana. |
|
| CVE-2024-12539 | Dec 17, 2024 |
Elasticsearch Improper Authorization Vulnerability in Document Level SecurityAn issue was discovered where improper authorization controls affected certain queries that could allow a malicious actor to circumvent Document Level Security in Elasticsearch and get access to documents that their roles would normally not allow. |
|
| CVE-2024-37285 | Nov 14, 2024 |
Kibana YAML Deserialization RCE Requires Index & Fleet PrivilegesA deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. A successful attack requires a malicious user to have a combination of both specific Elasticsearch indices privileges https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html#roles-indices-priv and Kibana privileges https://www.elastic.co/guide/en/fleet/current/fleet-roles-and-privileges.html assigned to them. The following Elasticsearch indices permissions are required * write privilege on the system indices .kibana_ingest* * The allow_restricted_indices flag is set to true Any of the following Kibana privileges are additionally required * Under Fleet the All privilege is granted * Under Integration the Read or All privilege is granted * Access to the fleet-setup privilege is gained through the Fleet Servers service account token |
|
| CVE-2024-37288 | Sep 09, 2024 |
Kibana Arbitrary Code Exec via YAML Deserialization in Elastic AIA deserialization issue in Kibana can lead to arbitrary code execution when Kibana attempts to parse a YAML document containing a crafted payload. This issue only affects users that use Elastic Securitys built-in AI tools https://www.elastic.co/guide/en/security/current/ai-for-security.html and have configured an Amazon Bedrock connector https://www.elastic.co/guide/en/security/current/assistant-connect-to-bedrock.html . |
|