Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25015: CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in Elastic Kibana

0
Critical
VulnerabilityCVE-2025-25015cvecve-2025-25015cwe-1321
Published: Wed Mar 05 2025 (03/05/2025, 09:46:34 UTC)
Source: CVE Database V5
Vendor/Project: Elastic
Product: Kibana

Description

Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors

AI-Powered Analysis

AILast updated: 02/26/2026, 20:13:56 UTC

Technical Analysis

CVE-2025-25015 is a prototype pollution vulnerability classified under CWE-1321 affecting Elastic Kibana versions from 8.15.0 up to but not including 8.17.1. Prototype pollution occurs when an attacker can manipulate the prototype of a base object, leading to unexpected behavior or arbitrary code execution. In this case, the vulnerability is triggered by specially crafted file uploads combined with malicious HTTP requests that modify object prototype attributes improperly. This flaw allows attackers to escalate privileges and execute arbitrary code on the Kibana server. Initially, users with the Viewer role could exploit this vulnerability in versions 8.15.0 through 8.17.0, significantly lowering the bar for exploitation. However, in versions 8.17.1 and 8.17.2, the exploitability is restricted to users with high-level privileges (fleet-all, integrations-all, actions:execute-advanced-connectors), reducing but not eliminating risk. The vulnerability has a CVSS 3.1 base score of 9.9, indicating critical severity with network attack vector, low attack complexity, required privileges, no user interaction, and complete impact on confidentiality, integrity, and availability. No public patches are linked yet, and no known exploits in the wild have been reported, but the potential for severe damage is high given the nature of the flaw and the widespread use of Kibana in enterprise environments for data visualization and monitoring.

Potential Impact

The impact of CVE-2025-25015 is severe and multifaceted. Successful exploitation can lead to arbitrary code execution on the Kibana server, potentially allowing attackers to take full control of the affected system. This compromises confidentiality by exposing sensitive data visualized or stored in Kibana, integrity by allowing unauthorized modification of data or configurations, and availability by enabling denial-of-service or destructive actions. Since Kibana is widely used for monitoring and managing Elasticsearch clusters and other critical infrastructure components, a compromise could cascade into broader network and data breaches. The fact that users with relatively low privileges (Viewer role) can exploit the vulnerability in certain versions increases the risk of insider threats or compromised user accounts being leveraged for attacks. Even in later versions where higher privileges are required, the presence of such powerful roles in many organizations means the attack surface remains significant. The vulnerability could disrupt business operations, lead to data loss, regulatory non-compliance, and damage to organizational reputation.

Mitigation Recommendations

To mitigate CVE-2025-25015, organizations should immediately upgrade Kibana to versions later than 8.17.2 once patches are released, as these versions restrict exploitability and likely include fixes. Until patches are available, restrict access to Kibana interfaces, especially limiting roles with Viewer and elevated privileges such as fleet-all, integrations-all, and actions:execute-advanced-connectors. Implement strict role-based access controls (RBAC) and audit user permissions to ensure minimal privilege principles are enforced. Monitor Kibana logs and network traffic for unusual file uploads or HTTP requests that could indicate exploitation attempts. Employ web application firewalls (WAF) with custom rules to detect and block suspicious payloads targeting prototype pollution vectors. Additionally, isolate Kibana servers within secure network segments and use multi-factor authentication (MFA) to reduce the risk of compromised credentials. Regularly review and update security policies and incident response plans to prepare for potential exploitation scenarios. Finally, maintain up-to-date backups of Kibana configurations and data to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
elastic
Date Reserved
2025-01-31T15:28:16.918Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a45985912abc71d662b3

Added to database: 2/26/2026, 7:51:53 PM

Last enriched: 2/26/2026, 8:13:56 PM

Last updated: 2/26/2026, 10:54:49 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses