Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0532: CWE-918 Server-Side Request Forgery (SSRF) in Elastic Kibana

0
High
VulnerabilityCVE-2026-0532cvecve-2026-0532cwe-918
Published: Wed Jan 14 2026 (01/14/2026, 10:14:57 UTC)
Source: CVE Database V5
Vendor/Project: Elastic
Product: Kibana

Description

CVE-2026-0532 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in Elastic Kibana versions 8. 15. 0, 9. 0. 0, and 9. 2. 0. It arises from improper validation of the Google Gemini connector configuration, allowing authenticated users with privileges to create or modify connectors to trigger arbitrary network requests and disclose arbitrary files on the server. Exploitation requires no user interaction but does require authenticated access with specific privileges. The vulnerability impacts confidentiality by enabling unauthorized file disclosure but does not affect integrity or availability.

AI-Powered Analysis

AILast updated: 01/14/2026, 10:47:05 UTC

Technical Analysis

CVE-2026-0532 is a vulnerability in Elastic Kibana that combines External Control of File Name or Path (CWE-73) with Server-Side Request Forgery (CWE-918). It specifically affects the Google Gemini connector configuration, where the server fails to properly validate a specially crafted credentials JSON payload. This flaw allows an attacker with authenticated access and sufficient privileges (Alerts & Connectors: All) to cause the server to perform arbitrary network requests and disclose arbitrary files on the server filesystem. The vulnerability exists in Kibana versions 8.15.0, 9.0.0, and 9.2.0. The attack vector requires no user interaction but does require privileges to create or modify connectors, which limits exploitation to insiders or compromised accounts with elevated rights. The vulnerability impacts confidentiality by exposing sensitive files and potentially internal network resources via SSRF. The CVSS 3.1 score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) indicates network exploitable, low attack complexity, no user interaction, and high confidentiality impact, with scope changed due to SSRF potentially accessing resources beyond the original security boundary. No public exploits are known yet, but the vulnerability is critical given the widespread use of Kibana in enterprise environments for monitoring and analytics.

Potential Impact

For European organizations, this vulnerability poses a significant confidentiality risk, especially for those using Elastic Kibana in environments with sensitive data or critical infrastructure monitoring. Attackers with authenticated access and connector privileges could exfiltrate sensitive configuration files, credentials, or internal network information, potentially facilitating further attacks or data breaches. The SSRF aspect could allow pivoting into internal networks otherwise inaccessible externally, increasing the attack surface. Given Kibana's role in observability and alerting, compromise could undermine trust in monitoring data and incident response capabilities. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly at risk. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score and ease of exploitation by privileged users necessitate urgent attention.

Mitigation Recommendations

1. Immediately audit and restrict privileges related to creating or modifying connectors in Kibana, limiting them to trusted administrators only. 2. Monitor and log all connector creation and modification activities to detect anomalous or unauthorized configurations. 3. Apply vendor patches or updates as soon as they become available to address this vulnerability. 4. Implement network segmentation and firewall rules to limit Kibana server access to trusted networks and prevent SSRF from reaching sensitive internal resources. 5. Conduct regular security reviews of connector configurations, especially those involving external integrations like Google Gemini. 6. Employ multi-factor authentication and strong access controls to reduce the risk of compromised credentials being used to exploit this vulnerability. 7. Consider disabling or removing unused connectors to reduce the attack surface. 8. Use runtime application self-protection (RASP) or web application firewalls (WAF) with SSRF detection capabilities to provide additional defense layers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
elastic
Date Reserved
2025-12-19T16:02:39.148Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696770cc8330e06716a7ebca

Added to database: 1/14/2026, 10:32:44 AM

Last enriched: 1/14/2026, 10:47:05 AM

Last updated: 1/14/2026, 11:34:27 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats