CVE-2025-25010

6.5 MEDIUM

📋 TL;DR

This CVE describes an incorrect authorization vulnerability in Kibana where the built-in reporting_user role has excessive permissions, allowing it to access all Kibana Spaces. This enables privilege escalation where users with reporting_user privileges can access data in spaces they shouldn't have permission to view. Organizations using Kibana with the reporting_user role are affected.

💻 Affected Systems

Products:
  • Elastic Kibana
Versions: Kibana 9.0.0 to 9.0.5, 9.1.0 to 9.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the built-in reporting_user role. Systems without this role configured are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with reporting_user credentials could access sensitive data across all Kibana Spaces, potentially exposing confidential business intelligence, logs, or monitoring data.

🟠

Likely Case

Internal users with reporting_user privileges inadvertently or intentionally access Kibana Spaces beyond their authorized scope, leading to data exposure and compliance violations.

🟢

If Mitigated

With proper role-based access controls and monitoring, impact is limited to unauthorized data viewing within the Kibana interface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid reporting_user credentials. The vulnerability is in role permissions configuration, not a code execution flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kibana 9.0.6, 9.1.3

Vendor Advisory: https://discuss.elastic.co/t/kibana-9-0-6-9-1-3-security-update-esa-2025-13/381426

Restart Required: Yes

Instructions:

1. Download Kibana 9.0.6 or 9.1.3 from Elastic website. 2. Stop Kibana service. 3. Backup configuration and data. 4. Install updated version. 5. Restart Kibana service. 6. Verify functionality.

🔧 Temporary Workarounds

Remove reporting_user role

all

Temporarily remove or disable the reporting_user role until patching is complete

kibana_space_management_api_call_to_remove_role

Restrict reporting_user access

all

Manually adjust role permissions to limit space access

kibana_role_management_api_call_to_adjust_permissions

🧯 If You Can't Patch

  • Audit all users with reporting_user role and review their access patterns
  • Implement additional monitoring and alerting for unauthorized space access attempts

🔍 How to Verify

Check if Vulnerable:

Check Kibana version via API: curl -X GET 'http://localhost:5601/api/status' or check installed package version

Check Version:

curl -X GET 'http://localhost:5601/api/status' | grep version

Verify Fix Applied:

Verify Kibana version is 9.0.6 or 9.1.3 or higher, then test reporting_user role permissions to confirm space access is properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns by reporting_user to multiple Kibana Spaces
  • Failed authorization attempts followed by successful access

Network Indicators:

  • API calls to spaces beyond expected scope for reporting_user

SIEM Query:

source:kibana AND (user:"reporting_user" OR role:"reporting_user") AND action:"access" AND space_id:*

🔗 References

📤 Share & Export