CVE-2025-12149
📋 TL;DR
This vulnerability in Search Guard FLX allows unauthorized document access when searches are triggered from Signals watches. Document-Level Security (DLS) rules are bypassed, potentially exposing sensitive data. Organizations using Search Guard FLX versions 3.1.2 and earlier with Signals watches and DLS enabled are affected.
💻 Affected Systems
- Search Guard FLX
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of all documents in queried indices to unauthorized users, potentially revealing sensitive business data, PII, or intellectual property.
Likely Case
Unauthorized users with access to Signals watches can view documents they shouldn't have permission to access, violating data segregation policies.
If Mitigated
Limited exposure if Signals watches are restricted to trusted users and monitored for unusual activity.
🎯 Exploit Status
Exploitation requires access to Signals watch functionality and knowledge of the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.3 or 4.0.0
Vendor Advisory: https://search-guard.com/cve-advisory/
Restart Required: Yes
Instructions:
1. Backup your Search Guard configuration. 2. Upgrade to Search Guard FLX 3.1.3 or 4.0.0. 3. Restart the Search Guard service. 4. Verify DLS enforcement works correctly with Signals watches.
🔧 Temporary Workarounds
Disable Signals watches
allTemporarily disable Signals watches functionality to prevent exploitation.
Modify Search Guard configuration to disable Signals watches feature
Restrict watch creation
allLimit who can create or modify Signals watches to trusted administrators only.
Adjust role-based access controls to restrict watch management permissions
🧯 If You Can't Patch
- Implement strict access controls on Signals watches creation and modification
- Monitor watch activity logs for unusual search patterns or unauthorized document access attempts
🔍 How to Verify
Check if Vulnerable:
Check if using Search Guard FLX version 3.1.2 or earlier with DLS and Signals watches enabled.
Check Version:
Check Search Guard FLX version in configuration files or via admin interface
Verify Fix Applied:
After patching, test that DLS rules are properly enforced when searches are triggered from Signals watches.
📡 Detection & Monitoring
Log Indicators:
- Unusual watch-triggered search patterns
- Access to documents outside user's DLS permissions via watch searches
Network Indicators:
- Increased search traffic from watch endpoints
- Unauthorized document retrieval patterns
SIEM Query:
Search for watch-triggered searches that return documents outside expected DLS scope