SB2025030544 - Authenticated code execution via prototype pollution in Kibana
Published: March 5, 2025 Updated: June 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Prototype pollution (CVE-ID: CVE-2025-25015)
The vulnerability allows a remote user to execute arbitrary code.
The vulnerability exists due to improper input validation when handling specially crafted HTTP requests with file upload. A remote user can upload a specially crafted file, perform prototype pollution and execute arbitrary code on the system.
Successful exploitation of the vulnerability requires Viewer role for Kibana from version 8.15.0 until 8.17.1, for versions 8.17.1 and 8.17.2 this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors.
Remediation
Install update from vendor's website.