Vulnerability Description
Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Elastic | Kibana | >= 8.15.0, < 8.16.6 |
Related Weaknesses (CWE)
References
- https://discuss.elastic.co/t/kibana-8-17-3-8-16-6-security-update-esa-2025-06/37MitigationVendor Advisory
FAQ
What is CVE-2025-25015?
CVE-2025-25015 is a vulnerability with a CVSS score of 9.9 (CRITICAL). Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by user...
How severe is CVE-2025-25015?
CVE-2025-25015 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-25015?
Check the references section above for vendor advisories and patch information. Affected products include: Elastic Kibana.