Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors
History

Wed, 02 Apr 2025 17:45:00 +0000


Wed, 02 Apr 2025 16:30:00 +0000


Wed, 05 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Mar 2025 10:00:00 +0000

Type Values Removed Values Added
Description Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors
Title Kibana arbitrary code execution via prototype pollution
Weaknesses CWE-1321
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2025-04-02T16:16:29.571Z

Reserved: 2025-01-31T15:28:16.918Z

Link: CVE-2025-25015

cve-icon Vulnrichment

Updated: 2025-03-05T14:51:10.870Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-05T10:15:20.160

Modified: 2025-04-02T17:15:45.240

Link: CVE-2025-25015

cve-icon Redhat

No data.