Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5vrw-qjxw-89r5 | Metricbeat Allocates Memory with Excessive Size Value Leading to Denial of Service |
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic metricbeat |
|
| Vendors & Products |
Elastic
Elastic metricbeat |
Thu, 19 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130). | |
| Title | Memory Allocation with Excessive Size Value in Metricbeat Leading to Denial of Service | |
| Weaknesses | CWE-789 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2026-03-19T17:20:38.549Z
Reserved: 2026-02-16T16:42:05.773Z
Link: CVE-2026-26931
Updated: 2026-03-19T17:20:35.484Z
Status : Awaiting Analysis
Published: 2026-03-19T17:16:23.320
Modified: 2026-03-20T13:39:46.493
Link: CVE-2026-26931
No data.
OpenCVE Enrichment
Updated: 2026-03-20T11:06:47Z
Github GHSA