Monday, May 12, 2025
HomeCVE/vulnerabilitySevere Kibana Flaw Allowed Attackers to Run Arbitrary Code

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

Published on

SIEM as a Service

Follow Us on Google News

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses at risk, with attackers able to execute arbitrary code on vulnerable systems.

The flaw, identified as CVE-2025-25014, carries a critical CVSS score of 9.1, underscoring the urgency for organizations to update their deployments immediately.

Elastic, the company behind Kibana, announced [ESA-2025-07] a critical prototype pollution vulnerability that allows an attacker to execute arbitrary code remotely.

- Advertisement - Google News

The flaw can be exploited through crafted HTTP requests targeting Kibana’s Machine Learning and Reporting endpoints.

“This vulnerability could allow an attacker with access privileges to compromise data integrity and system availability,” Elastic stated in their official announcement.

The primary risk arises when both the Machine Learning and Reporting features are enabled on affected instances.

Impacted Versions and Products

The vulnerability affects multiple versions of Kibana, both in self-hosted setups and Elastic Cloud deployments.

ProductAffected VersionsSafe Versions
Kibana8.3.0 – 8.17.58.17.6
8.18.08.18.1
9.0.09.0.1

Users running any of the above affected versions with both Machine Learning and Reporting features enabled are at risk. This includes both self-hosted installations and Elastic Cloud users.

Immediate Recommendations

  • Upgrade: Elastic strongly advises upgrading to the fixed versions: 8.17.6, 8.18.1, or 9.0.1.
  • If You Can’t Upgrade:
    • Disable Machine Learning: Add xpack.ml.enabled: false to your kibana.yml.
    • Or Disable Reporting: Add xpack.reporting.enabled: false to your kibana.yml.

Elastic also provides an option for self-hosted users to disable just the anomaly detection feature via xpack.ml.ad.enabled: faNo known exploits are reported in the wild yet, but the potential impact is severe-enabling attackers to compromise sensitive business data and disrupt operations.

Organizations using Kibana are urged to review their deployments and act immediately.

Delaying mitigation could expose critical systems to sophisticated attacks capable of hijacking infrastructure and stealing sensitive data. 

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...