Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25018: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Elastic Kibana

0
High
VulnerabilityCVE-2025-25018cvecve-2025-25018cwe-79
Published: Fri Oct 10 2025 (10/10/2025, 09:50:35 UTC)
Source: CVE Database V5
Vendor/Project: Elastic
Product: Kibana

Description

Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:10:35 UTC

Technical Analysis

CVE-2025-25018 is a vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), specifically a stored Cross-Site Scripting (XSS) flaw in Elastic Kibana. This vulnerability exists in multiple versions of Kibana, from 7.0.0 up to 9.1.0, and was published on October 10, 2025. The root cause is the failure to properly sanitize or encode user-supplied input before embedding it into web pages generated by Kibana. As a result, an attacker with limited privileges (requiring some authentication) can inject malicious scripts that are stored and later executed in the browsers of other users who view the affected pages. The CVSS v3.1 score is 8.7 (high), reflecting the network attack vector, low attack complexity, requirement for privileges and user interaction, and the potential for complete confidentiality and integrity compromise, though availability is not impacted. The vulnerability affects Kibana’s web interface, which is widely used for data visualization and management in Elastic Stack deployments. While no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of data and administrative functions accessible via Kibana. The vulnerability was reserved early in 2025 and is currently published but lacks official patches at the time of this report.

Potential Impact

The impact of CVE-2025-25018 is substantial for organizations using Elastic Kibana, especially those relying on it for monitoring, logging, and data visualization in critical infrastructure, financial services, healthcare, and government sectors. Successful exploitation can lead to the execution of arbitrary JavaScript in the context of authenticated users, potentially exposing sensitive information such as authentication tokens, user data, and configuration details. Attackers could hijack user sessions, perform unauthorized actions, or pivot to other internal systems. Although availability is not directly affected, the compromise of confidentiality and integrity can lead to broader security incidents, including data breaches and loss of trust. The requirement for user interaction and some level of authentication somewhat limits the attack surface but does not eliminate risk, particularly in environments with many users or less stringent access controls. The widespread adoption of Kibana globally means the threat is relevant to many organizations, especially those with internet-facing Kibana instances or insufficient network segmentation.

Mitigation Recommendations

Organizations should immediately prepare to apply official patches from Elastic once they become available, as patching is the most effective mitigation. Until patches are released, administrators should restrict access to Kibana interfaces to trusted networks and users only, employing strong authentication and multi-factor authentication (MFA) to reduce the risk of unauthorized access. Implement strict input validation and output encoding on any custom plugins or integrations that interact with Kibana to minimize injection risks. Deploy Content Security Policies (CSP) to restrict the execution of untrusted scripts within Kibana’s web interface. Regularly audit Kibana user roles and permissions to enforce the principle of least privilege, limiting the number of users who can input or modify content that might be rendered in the UI. Monitor logs and network traffic for unusual activity indicative of attempted exploitation. Consider isolating Kibana instances from direct internet exposure using VPNs or reverse proxies with additional security controls. Finally, educate users about the risks of interacting with untrusted content within Kibana dashboards or visualizations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
elastic
Date Reserved
2025-01-31T15:28:16.918Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8debbaec0381be58193b6

Added to database: 10/10/2025, 10:23:55 AM

Last enriched: 2/27/2026, 1:10:35 AM

Last updated: 3/24/2026, 4:43:25 PM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses