Elastic Security Vulnerabilities (CVEs)
Track 50 security vulnerabilities affecting Elastic products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This CVE describes two denial-of-service vulnerabilities in Metricbeat where specially crafted payloads sent to Graphite or Zookeeper metricsets, or m...
Jan 13, 2026This vulnerability in Kibana Fleet allows attackers to send specially crafted requests that cause excessive resource allocation, leading to service de...
Jan 13, 2026CVE-2026-0531 is a resource exhaustion vulnerability in Kibana Fleet where specially crafted bulk retrieval requests can cause excessive memory consum...
Jan 13, 2026This CVE describes a cross-site scripting (XSS) vulnerability in Vega visualization components that allows authenticated users to inject malicious scr...
Dec 18, 2025This vulnerability allows authenticated Kibana users to escalate privileges by changing document sharing settings to 'global', making documents visibl...
Dec 18, 2025This CVE describes a cross-site scripting (XSS) vulnerability in Kibana's Vega AST evaluator that allows unauthenticated attackers to inject malicious...
Dec 18, 2025This vulnerability allows authenticated Kibana users with low privileges to send crafted HTTP requests that cause excessive resource allocation, leadi...
Dec 18, 2025This vulnerability allows authenticated Elasticsearch users with snapshot restore privileges to cause memory exhaustion and denial of service through ...
Dec 18, 2025CVE-2025-68422 is an improper authorization vulnerability in Kibana that allows authenticated users to bypass permission restrictions via crafted HTTP...
Dec 18, 2025This vulnerability allows attackers to trigger a buffer overflow in Filebeat's Syslog parser or Libbeat Dissect processor, causing the Filebeat proces...
Dec 18, 2025This vulnerability allows authenticated Elasticsearch users with low privileges to submit oversized user settings data, causing excessive memory alloc...
Dec 18, 2025CVE-2025-37731 is an improper authentication vulnerability in Elasticsearch's PKI realm that allows user impersonation via specially crafted client ce...
Dec 15, 2025This CVE describes a cross-site scripting (XSS) vulnerability in Kibana's integration package upload functionality that allows authenticated users to ...
Dec 15, 2025An origin validation error in Kibana's Observability AI Assistant allows attackers to perform Server-Side Request Forgery (SSRF) by forging the Origin...
Nov 12, 2025This CVE describes an improper authorization vulnerability in Elastic Cloud Enterprise where the built-in readonly user can access privileged APIs tha...
Nov 7, 2025This CVE describes a template injection vulnerability in Elastic Cloud Enterprise (ECE) where Jinjava template variables are improperly neutralized. A...
Oct 13, 2025This vulnerability allows sensitive information to be exposed in Elasticsearch log files when auditing requests to the reindex API. Attackers with acc...
Oct 10, 2025This vulnerability in Kibana allows attackers to inject malicious scripts into web pages through improper input neutralization, leading to stored cros...
Oct 10, 2025This CVE describes a cross-site scripting (XSS) vulnerability in Kibana where improper input sanitization during web page generation allows attackers ...
Oct 10, 2025This CVE describes an incorrect authorization vulnerability in Kibana where the built-in reporting_user role has excessive permissions, allowing it to...
Aug 28, 2025This CVE describes an improper authorization vulnerability in Kibana's Synthetic monitor endpoint that allows authenticated users to perform unauthori...
Jun 10, 2025A prototype pollution vulnerability in Kibana allows attackers to execute arbitrary code by sending specially crafted HTTP requests to machine learnin...
May 6, 2025This vulnerability allows local attackers with the ability to modify osqueryd configurations to execute arbitrary code via parameter injection in Elas...
May 1, 2025This vulnerability allows attackers to upload malicious HTML/JavaScript files through Kibana's Synthetics app, leading to cross-site scripting (XSS) a...
May 1, 2025This vulnerability allows attackers to exploit prototype pollution in Kibana to achieve code injection by combining unrestricted file upload with path...
Apr 8, 2025This vulnerability allows authenticated users with read access to Kibana to send specially crafted payloads that cause resource exhaustion, leading to...
Jan 23, 2025This CVE describes an information disclosure vulnerability in Kibana where users without Fleet privileges can view Elastic Agent policies that may con...
Jan 23, 2025A server-side request forgery (SSRF) vulnerability in Kibana's Fleet API allows authenticated users with read access to send requests to internal HTTP...
Jan 23, 2025This vulnerability in Elasticsearch allows attackers to cause a denial of service by sending specially crafted SQL queries that trigger excessive memo...
Jan 21, 2025A deserialization vulnerability in Kibana allows authenticated attackers with specific Elasticsearch and Kibana privileges to execute arbitrary code b...
Nov 14, 2024A deserialization vulnerability in Kibana allows arbitrary code execution when parsing malicious YAML documents. This only affects users who have enab...
Sep 9, 2024This CVE describes a prototype pollution vulnerability in Kibana that allows authenticated attackers with specific permissions to execute arbitrary co...
Aug 13, 2024This CVE allows sensitive Elasticsearch document contents to be exposed in application logs when Watcher search input is configured with DEBUG logging...
Jul 26, 2024This vulnerability allows API keys with specific privileges to create new API keys with elevated privileges, leading to privilege escalation. It affec...
Jun 28, 2024This vulnerability allows high-privileged Kibana users with osquery pack creation permissions to upload malicious packs that could cause Kibana availa...
Jun 19, 2024This CVE describes an open redirect vulnerability in Kibana where attackers can craft malicious URLs that redirect users to arbitrary external website...
Jun 14, 2024This vulnerability allows view-only users in Kibana to abuse the run_soon API to trigger continuous execution of alerting rules. This could lead to re...
Jun 13, 2024This vulnerability in Kibana logs sensitive credentials like kibana_system user passwords, API keys, and end-user credentials when specific errors occ...
Dec 13, 2023This vulnerability allows a local user to escalate privileges by attaching a malicious plugin to an application running the Elastic APM Java agent. At...
Nov 22, 2023CVE-2023-46672 is a Logstash vulnerability where sensitive information from the keystore can be exposed in JSON-formatted logs when referenced as vari...
Nov 15, 2023CVE-2023-31418 is a denial-of-service vulnerability in Elasticsearch's HTTP layer where unauthenticated attackers can cause nodes to crash with OutOfM...
Oct 26, 2023Kibana 8.10.0 logs sensitive information like authentication credentials, cookies, and authorization headers in error logs when configured with JSON l...
Oct 26, 2023Fleet Server versions 8.10.0 through 8.10.2 log agent enrollment tokens in plain text, allowing attackers who access logs to enroll unauthorized agent...
Oct 26, 2023CVE-2023-31414 allows arbitrary code execution in Kibana when an attacker with write access to configuration files injects malicious JavaScript payloa...
May 4, 2023CVE-2022-38777 is a privilege escalation vulnerability in Elastic Endpoint Security for Windows. Unprivileged users can exploit the rollback feature t...
Feb 8, 2023This CVE describes a local privilege escalation vulnerability in Elastic Endpoint Security for Windows. Unprivileged users can exploit this flaw to ga...
Jul 6, 2022CVE-2022-23712 is a Denial of Service vulnerability in Elasticsearch where an unauthenticated attacker can send a specially crafted network request to...
Jun 6, 2022This vulnerability in Elastic Enterprise Search App Search allows API keys to access engines beyond their intended scope. A less privileged user could...
Sep 15, 2021Elastic Cloud Enterprise versions have the Elasticsearch 'anonymous' user enabled by default, allowing attackers to query cluster details without auth...
Jul 21, 2021This XXE vulnerability in Elastic App Search's web crawler beta feature allows attackers to read sensitive files on the host system. Attackers can exp...
May 13, 2021Why Monitor Elastic Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 50+ known vulnerabilities affecting Elastic products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Elastic packages in under 60 seconds. No agents required - completely agentless scanning that works across Elastic deployments.
Free vulnerability database: Access detailed information about every Elastic CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Elastic CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions