Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68422: CWE-863 Incorrect Authorization in Elastic Kibana

0
Medium
VulnerabilityCVE-2025-68422cvecve-2025-68422cwe-863
Published: Thu Dec 18 2025 (12/18/2025, 22:32:17 UTC)
Source: CVE Database V5
Vendor/Project: Elastic
Product: Kibana

Description

Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries.

AI-Powered Analysis

AILast updated: 12/25/2025, 23:38:43 UTC

Technical Analysis

CVE-2025-68422 is a vulnerability classified under CWE-863 (Incorrect Authorization) found in Elastic Kibana versions 7.0.0 through 9.2.0. The flaw allows an authenticated user lacking the 'live queries - read' permission to bypass intended authorization controls by sending a specially crafted HTTP request. This results in unauthorized access to the list of live queries, which may contain sensitive information about ongoing data retrieval operations or monitoring activities. The vulnerability stems from improper enforcement of permission checks within Kibana's API endpoints handling live query data. While the vulnerability does not allow modification or disruption of data (no integrity or availability impact), it compromises confidentiality by exposing potentially sensitive query details to unauthorized users. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low attack complexity, requirement for privileges (authenticated user), no user interaction, and limited impact on confidentiality only. No public exploits or active exploitation have been reported as of the publication date. The vulnerability is relevant for organizations using Kibana for data visualization and security analytics, especially where live query data is sensitive. Elastic has not yet published patches, so mitigation currently relies on access control and monitoring.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of live query information within Kibana, which could reveal sensitive operational or security monitoring data. This exposure may aid attackers in understanding internal query patterns, potentially facilitating further attacks or reconnaissance. Organizations relying on Kibana for security event monitoring, threat hunting, or compliance reporting could see a reduction in data confidentiality. Although the vulnerability does not allow data modification or service disruption, the leakage of live queries could indirectly weaken security postures. Given the widespread use of Elastic Stack in European enterprises, especially in sectors like finance, telecommunications, and government, the risk is non-trivial. Attackers with valid credentials (e.g., compromised user accounts) can exploit this vulnerability remotely without user interaction, increasing the threat surface. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Monitor Elastic's official channels for patches addressing CVE-2025-68422 and apply them promptly once available. 2. Restrict Kibana access strictly to trusted users and networks using network segmentation, VPNs, or IP whitelisting to reduce exposure. 3. Enforce the principle of least privilege by reviewing and minimizing user permissions, ensuring only necessary users have access to Kibana and its live query features. 4. Implement robust authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 5. Enable detailed logging and monitoring of Kibana API requests to detect unusual or unauthorized access attempts, focusing on live query endpoints. 6. Consider deploying Web Application Firewalls (WAFs) or API gateways to filter and block suspicious crafted HTTP requests targeting Kibana. 7. Educate administrators and users about the risks of privilege escalation and the importance of credential security. 8. Regularly audit Kibana configurations and user roles to ensure compliance with security policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
elastic
Date Reserved
2025-12-17T14:30:39.402Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694483164eb3efac36b0f27d

Added to database: 12/18/2025, 10:41:26 PM

Last enriched: 12/25/2025, 11:38:43 PM

Last updated: 2/7/2026, 10:46:37 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats