BIT-elk-2026-0543

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/elk/BIT-elk-2026-0543.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-elk-2026-0543
Aliases
Published
2026-01-16T08:39:07.127Z
Modified
2026-01-16T09:26:32.375135Z
Summary
Improper Input Validation in Kibana Email Connector Leading to Excessive Allocation
Details

Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed.

Database specific
{
    "cpes": [
        "cpe:2.3:a:elasticsearch:kibana:*:*:*:*:*:node.js:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / elk

Package

Name
elk
Purl
pkg:bitnami/elk

Severity

  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.19.10
Introduced
9.0.0
Fixed
9.1.10
Introduced
9.2.0
Fixed
9.2.4

Database specific

source

"https://github.com/bitnami/vulndb/tree/main/data/elk/BIT-elk-2026-0543.json"