CVE-2025-37732

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in Kibana's integration package upload functionality that allows authenticated users to inject HTML into other users' browsers. It affects Kibana instances where users can upload integration packages. This vulnerability bypasses a previous fix (ESA-2025-17/CVE-2025-25018) to achieve HTML injection.

💻 Affected Systems

Products:
  • Elastic Kibana
Versions: Specific versions not provided in CVE description; refer to Elastic advisory ESA-2025-28
Operating Systems: All platforms running Kibana
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to integration package upload functionality

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal session cookies, perform actions as other users, or redirect users to malicious sites, potentially leading to account compromise or data theft.

🟠

Likely Case

An authenticated malicious user injects malicious scripts that execute in other users' browsers, potentially stealing session tokens or performing unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, the injected HTML would be rendered harmless as plain text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the vulnerability; bypasses previous XSS fix

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kibana 8.19.8, 9.1.8, and 9.2.2 (per ESA-2025-28)

Vendor Advisory: https://discuss.elastic.co/t/kibana-8-19-8-9-1-8-and-9-2-2-security-update-esa-2025-28/384064

Restart Required: Yes

Instructions:

1. Review Elastic advisory ESA-2025-28. 2. Upgrade Kibana to version 8.19.8, 9.1.8, or 9.2.2. 3. Restart Kibana service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable integration package upload

all

Temporarily disable the integration package upload functionality if not required

Configuration depends on Kibana deployment; consult Kibana documentation for disabling specific features

Implement WAF rules

all

Deploy web application firewall rules to detect and block XSS payloads in upload requests

🧯 If You Can't Patch

  • Restrict access to integration package upload functionality to trusted administrators only
  • Implement Content Security Policy (CSP) headers to mitigate impact of successful XSS exploitation

🔍 How to Verify

Check if Vulnerable:

Check Kibana version against affected versions in ESA-2025-28; if using integration package upload feature and version is below patched versions, assume vulnerable

Check Version:

curl -X GET "http://localhost:5601/api/status" | grep "number"

Verify Fix Applied:

Verify Kibana version is 8.19.8, 9.1.8, or 9.2.2 or higher; test integration package upload functionality with XSS payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual integration package uploads with HTML/script content
  • Multiple failed upload attempts with suspicious payloads

Network Indicators:

  • HTTP POST requests to integration upload endpoints containing script tags or JavaScript

SIEM Query:

source="kibana.log" AND "integration" AND "upload" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export