Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25010: CWE-863 Incorrect Authorization in Elastic Kibana

0
Medium
VulnerabilityCVE-2025-25010cvecve-2025-25010cwe-863
Published: Thu Aug 28 2025 (08/28/2025, 15:52:08 UTC)
Source: CVE Database V5
Vendor/Project: Elastic
Product: Kibana

Description

Incorrect authorization in Kibana can lead to privilege escalation via the built-in reporting_user role which incorrectly has the ability to access all Kibana Spaces.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:09:56 UTC

Technical Analysis

CVE-2025-25010 is an authorization vulnerability classified under CWE-863 that affects Elastic Kibana versions 9.0.0 and 9.1.0. The issue arises because the built-in reporting_user role is incorrectly configured to allow access across all Kibana Spaces, which are logical partitions used to segregate data and dashboards within Kibana. Normally, this role should have limited access scoped to specific spaces, but due to the flawed authorization logic, users assigned this role can escalate their privileges by accessing data and dashboards beyond their authorized boundaries. This vulnerability does not require user interaction and can be exploited remotely over the network by an authenticated user with the reporting_user role, making it a significant risk in multi-tenant or segmented environments. The CVSS 3.1 base score of 6.5 reflects a medium severity, with a vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). Although no public exploits have been reported yet, the vulnerability could lead to unauthorized data disclosure and potential information leakage within organizations using Kibana for data visualization and monitoring. The lack of an official patch at the time of reporting necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

The primary impact of this vulnerability is unauthorized access to sensitive data within Kibana Spaces, which can lead to significant confidentiality breaches. Organizations relying on Kibana for monitoring, analytics, and reporting may inadvertently expose critical operational or business intelligence data to users who should not have access. This can undermine trust in data integrity, violate compliance requirements, and potentially expose sensitive customer or internal information. Since the vulnerability allows privilege escalation without impacting data integrity or availability, the main risk is data leakage rather than system disruption. However, unauthorized visibility into dashboards and reports can facilitate further attacks or insider threats. The vulnerability is particularly impactful in environments with multiple tenants or segmented teams relying on strict access controls. The ease of exploitation by authenticated users with limited privileges increases the risk in large organizations where user roles are broadly assigned. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-25010, organizations should first review and restrict the permissions assigned to the reporting_user role, ensuring it does not have access beyond intended Kibana Spaces. Implement role-based access control (RBAC) policies that enforce strict least privilege principles, limiting user roles to only necessary spaces and data. Monitor Kibana access logs for unusual or unauthorized access patterns, especially from users with the reporting_user role. Until an official patch is released by Elastic, consider disabling or removing the reporting_user role if feasible, or create custom roles with tightly scoped permissions as a temporary workaround. Regularly update Kibana and Elastic Stack components to the latest versions once patches become available. Additionally, enforce strong authentication mechanisms and network segmentation to reduce the attack surface. Conduct periodic audits of user roles and permissions to detect and remediate any privilege escalation risks proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
elastic
Date Reserved
2025-01-31T15:28:16.917Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b07dadad5a09ad006e0f53

Added to database: 8/28/2025, 4:02:53 PM

Last enriched: 2/27/2026, 1:09:56 AM

Last updated: 3/21/2026, 6:00:49 PM

Views: 162

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses