Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 11 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:elastic:elastic_cloud_enterprise:*:*:*:*:*:*:*:* |
Thu, 06 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic elastic Cloud Enterprise |
|
| Vendors & Products |
Elastic
Elastic elastic Cloud Enterprise |
Mon, 13 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper neutralization of special elements used in a template engine in Elastic Cloud Enterprise (ECE) can lead to a malicious actor with Admin access exfiltrating sensitive information and issuing commands via a specially crafted string where Jinjava variables are evaluated. | |
| Title | Elastic Cloud Enterprise (ECE) Improper Neutralization of Special Elements Used in a Template Engine | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2026-02-26T17:47:45.796Z
Reserved: 2025-04-16T03:24:04.510Z
Link: CVE-2025-37729
Updated: 2025-11-06T14:43:43.435Z
Status : Analyzed
Published: 2025-10-13T14:15:34.533
Modified: 2025-12-11T20:59:06.597
Link: CVE-2025-37729
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:10:47Z