BIT-kibana-2025-25015

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/kibana/BIT-kibana-2025-25015.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-kibana-2025-25015
Aliases
Published
2025-03-07T20:56:34.668Z
Modified
2025-05-20T10:02:07.006Z
Summary
Kibana arbitrary code execution via prototype pollution
Details

Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors

Database specific
{
    "severity": "Critical",
    "cpes": [
        "cpe:2.3:a:elasticsearch:kibana:*:*:*:*:*:node.js:*:*"
    ]
}
References

Affected packages

Bitnami / kibana

Package

Name
kibana
Purl
pkg:bitnami/kibana

Severity

  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
8.15.0
Fixed
8.17.3