Severity Level: Critical
Title:
Critical Vulnerability in Kibana
Summary:
Elastic has released a security update to address a critical vulnerability in Kibana, its widely used
data visualization and exploration platform. The vulnerability, tracked as CVE-2025-25012, has
been assigned a CVSS score of 9.9 and could allow attackers to execute arbitrary code on vulnerable
systems.
Kibana is a key component of the Elastic Stack, enabling users to visualize and analyze data indexed
in Elasticsearch. The vulnerability stems from a prototype pollution issue that can be exploited
through a crafted file upload and specially crafted HTTP requests.
• CVE ID: CVE-2025-25012
• Severity (Critical)
Affected Versions:
• Kibana 8.15.0 to 8.17.0: Exploitable by users with the ‘Viewer’ role.
• Kibana 8.17.1 and 8.17.2: Exploitable by users with specific privileges (fleet-all, integrations[1]all, actions:execute-advanced-connectors).
Temporary Mitigation (If Upgrade is Not Immediately Possible):
• Disable the Integration Assistant by adding the following configuration to your Kibana
settings: Set xpack.integration_assistant.enabled: false in Kibana's configuration.
Fixed Versions:
• Kibana version 8.17.3
Recommendations:
We recommended to upgrade Kibana version to the fixed or latest version as soon as possible.
References:
click here