CVE-2025-68385

7.2 HIGH

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in Vega visualization components that allows authenticated users to inject malicious scripts into web content. The vulnerability bypasses previous XSS mitigations and affects Kibana users with authenticated access. Successful exploitation could lead to session hijacking, data theft, or unauthorized actions.

💻 Affected Systems

Products:
  • Elastic Kibana
Versions: Multiple versions prior to security updates
Operating Systems: All platforms running affected Kibana versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects Vega visualization components specifically

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, gain full administrative access to Kibana, exfiltrate sensitive data, and potentially pivot to other systems in the environment.

🟠

Likely Case

Authenticated attackers could steal other users' session tokens, perform actions on their behalf, or capture sensitive information displayed in Kibana dashboards.

🟢

If Mitigated

With proper network segmentation, strong authentication controls, and content security policies, the impact is limited to the Kibana instance itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access; the vulnerability bypasses existing XSS mitigations making exploitation easier than typical XSS

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kibana 8.19.9, 9.1.9, 9.2.3

Vendor Advisory: https://discuss.elastic.co/t/kibana-8-19-9-9-1-9-and-9-2-3-security-update-esa-2025-34/384182

Restart Required: Yes

Instructions:

1. Identify your Kibana version. 2. Upgrade to Kibana 8.19.9, 9.1.9, or 9.2.3 depending on your current version track. 3. Restart Kibana service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Vega Visualization Access

all

Limit which users can create or modify Vega visualizations to reduce attack surface

Configure Kibana role-based access control to restrict Vega visualization permissions

Implement Content Security Policy

all

Add CSP headers to restrict script execution from untrusted sources

Add 'Content-Security-Policy' header with appropriate directives to Kibana configuration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Kibana instances from sensitive systems
  • Enforce strong authentication controls and monitor for suspicious user activity

🔍 How to Verify

Check if Vulnerable:

Check Kibana version via web interface or API; versions prior to 8.19.9, 9.1.9, or 9.2.3 are vulnerable

Check Version:

curl -X GET "http://localhost:5601/api/status" | grep "number"

Verify Fix Applied:

Verify Kibana version shows 8.19.9, 9.1.9, or 9.2.3 after upgrade

📡 Detection & Monitoring

Log Indicators:

  • Unusual Vega visualization creation/modification patterns
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from Kibana server
  • Suspicious payloads in HTTP requests to visualization endpoints

SIEM Query:

source="kibana.log" AND ("vega" OR "visualization") AND ("create" OR "update") | stats count by user, src_ip

🔗 References

📤 Share & Export