A successful attack requires a malicious user to have read permissions for Observability assigned to them.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10273 | An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them. |
Tue, 30 Sep 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* |
Tue, 08 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Apr 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them. | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2025-04-08T19:59:21.939Z
Reserved: 2024-11-18T14:48:22.149Z
Link: CVE-2024-52974
Updated: 2025-04-08T19:59:16.532Z
Status : Analyzed
Published: 2025-04-08T17:15:34.653
Modified: 2025-09-30T21:36:21.957
Link: CVE-2024-52974
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:32:19Z
EUVD