Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors
[
{
"signature_type": "Line",
"source": "https://github.com/elastic/elasticsearch/commit/2eabb32aee47ed0c4ba71c169f098d0379402efe",
"target": {
"file": "build-tools-internal/src/main/java/org/elasticsearch/gradle/internal/toolchain/ArchivedOracleJdkToolchainResolver.java"
},
"id": "CVE-2025-25015-a4f0942e",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"36255366982402441943365076301650356089",
"145006512619480278887571052439883120125",
"157169414809992097628712548295209386229",
"163221426113429786005159139466844966457"
]
},
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-25015.json"