CVE-2025-37736: CWE-863 Incorrect Authorization in Elastic Elastic Cloud Enterprise (ECE)
Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is: post:/platform/configuration/security/service-accounts delete:/platform/configuration/security/service-accounts/{user_id} patch:/platform/configuration/security/service-accounts/{user_id} post:/platform/configuration/security/service-accounts/{user_id}/keys delete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id} patch:/user post:/users post:/users/auth/keys delete:/users/auth/keys delete:/users/auth/keys/_all delete:/users/auth/keys/{api_key_id} delete:/users/{user_id}/auth/keys delete:/users/{user_id}/auth/keys/{api_key_id} delete:/users/{user_name} patch:/users/{user_name}
AI Analysis
Technical Summary
CVE-2025-37736 is an authorization bypass vulnerability categorized under CWE-863 (Incorrect Authorization) affecting Elastic Cloud Enterprise (ECE) versions 3.8.0 and 4.0.0. The vulnerability arises because the built-in readonly user role is improperly authorized, allowing it to invoke several sensitive REST API endpoints that should be restricted to higher privilege users. These APIs include operations to create, delete, and modify service accounts and their API keys, as well as user account management functions such as creating users, managing authentication keys, and deleting users. Exploiting this flaw enables an attacker with readonly access to escalate privileges and gain administrative control over the ECE environment. The vulnerability is remotely exploitable over the network without user interaction and requires only low complexity privileges (readonly user). The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as an attacker can manipulate security configurations and user credentials. Although no public exploits are currently known, the severity and nature of the flaw make it a critical risk for organizations relying on Elastic Cloud Enterprise for managing Elasticsearch clusters and related services. The lack of available patches at the time of disclosure necessitates immediate risk mitigation.
Potential Impact
The vulnerability allows attackers with readonly user privileges to escalate their access to administrative levels, enabling unauthorized creation, modification, and deletion of service accounts and user authentication keys. This can lead to full compromise of the Elastic Cloud Enterprise environment, including unauthorized data access, manipulation, or deletion, and disruption of service availability. Attackers could create or revoke API keys, delete users, or alter user privileges, severely impacting the confidentiality, integrity, and availability of data and services managed by ECE. Organizations using affected versions risk data breaches, loss of control over their Elasticsearch clusters, and potential lateral movement within their infrastructure. The impact is especially critical for enterprises relying on ECE for large-scale data analytics, logging, and monitoring, where service disruption or data compromise can have cascading effects on business operations and compliance.
Mitigation Recommendations
Immediate mitigation involves restricting readonly user access and monitoring API usage for suspicious activity. Organizations should implement strict network segmentation and access controls to limit exposure of ECE management interfaces. Until patches are available, consider disabling or restricting the affected API endpoints via proxy or firewall rules. Employ robust logging and alerting on service account and user management API calls to detect unauthorized attempts. Review and minimize the assignment of readonly roles to only trusted personnel and systems. When patches are released by Elastic, apply them promptly. Additionally, conduct regular audits of service accounts, API keys, and user privileges to identify and remediate any unauthorized changes. Employ multi-factor authentication and strong credential management to reduce risk of credential compromise that could be leveraged in conjunction with this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Netherlands, Canada, Australia, Japan, South Korea, India
CVE-2025-37736: CWE-863 Incorrect Authorization in Elastic Elastic Cloud Enterprise (ECE)
Description
Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is: post:/platform/configuration/security/service-accounts delete:/platform/configuration/security/service-accounts/{user_id} patch:/platform/configuration/security/service-accounts/{user_id} post:/platform/configuration/security/service-accounts/{user_id}/keys delete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id} patch:/user post:/users post:/users/auth/keys delete:/users/auth/keys delete:/users/auth/keys/_all delete:/users/auth/keys/{api_key_id} delete:/users/{user_id}/auth/keys delete:/users/{user_id}/auth/keys/{api_key_id} delete:/users/{user_name} patch:/users/{user_name}
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-37736 is an authorization bypass vulnerability categorized under CWE-863 (Incorrect Authorization) affecting Elastic Cloud Enterprise (ECE) versions 3.8.0 and 4.0.0. The vulnerability arises because the built-in readonly user role is improperly authorized, allowing it to invoke several sensitive REST API endpoints that should be restricted to higher privilege users. These APIs include operations to create, delete, and modify service accounts and their API keys, as well as user account management functions such as creating users, managing authentication keys, and deleting users. Exploiting this flaw enables an attacker with readonly access to escalate privileges and gain administrative control over the ECE environment. The vulnerability is remotely exploitable over the network without user interaction and requires only low complexity privileges (readonly user). The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as an attacker can manipulate security configurations and user credentials. Although no public exploits are currently known, the severity and nature of the flaw make it a critical risk for organizations relying on Elastic Cloud Enterprise for managing Elasticsearch clusters and related services. The lack of available patches at the time of disclosure necessitates immediate risk mitigation.
Potential Impact
The vulnerability allows attackers with readonly user privileges to escalate their access to administrative levels, enabling unauthorized creation, modification, and deletion of service accounts and user authentication keys. This can lead to full compromise of the Elastic Cloud Enterprise environment, including unauthorized data access, manipulation, or deletion, and disruption of service availability. Attackers could create or revoke API keys, delete users, or alter user privileges, severely impacting the confidentiality, integrity, and availability of data and services managed by ECE. Organizations using affected versions risk data breaches, loss of control over their Elasticsearch clusters, and potential lateral movement within their infrastructure. The impact is especially critical for enterprises relying on ECE for large-scale data analytics, logging, and monitoring, where service disruption or data compromise can have cascading effects on business operations and compliance.
Mitigation Recommendations
Immediate mitigation involves restricting readonly user access and monitoring API usage for suspicious activity. Organizations should implement strict network segmentation and access controls to limit exposure of ECE management interfaces. Until patches are available, consider disabling or restricting the affected API endpoints via proxy or firewall rules. Employ robust logging and alerting on service account and user management API calls to detect unauthorized attempts. Review and minimize the assignment of readonly roles to only trusted personnel and systems. When patches are released by Elastic, apply them promptly. Additionally, conduct regular audits of service accounts, API keys, and user privileges to identify and remediate any unauthorized changes. Employ multi-factor authentication and strong credential management to reduce risk of credential compromise that could be leveraged in conjunction with this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- elastic
- Date Reserved
- 2025-04-16T03:24:04.511Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690e71563a5f68e27f2ed920
Added to database: 11/7/2025, 10:23:18 PM
Last enriched: 2/27/2026, 1:56:45 AM
Last updated: 3/22/2026, 3:16:30 AM
Views: 170
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.