SB2025030544 - Authenticated code execution via prototype pollution in Kibana



SB2025030544 - Authenticated code execution via prototype pollution in Kibana

Published: March 5, 2025 Updated: June 24, 2025

Security Bulletin ID SB2025030544
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Prototype pollution (CVE-ID: CVE-2025-25015)

The vulnerability allows a remote user to execute arbitrary code.

The vulnerability exists due to improper input validation when handling specially crafted HTTP requests with file upload. A remote user can upload a specially crafted file, perform prototype pollution and execute arbitrary code on the system.

Successful exploitation of the vulnerability requires Viewer role for Kibana from version 8.15.0 until 8.17.1, for versions  8.17.1 and 8.17.2 this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors.


Remediation

Install update from vendor's website.