#VU125552 Path traversal in Logstash - CVE-2026-33466
Published: April 9, 2026
Logstash
Elastic Stack
Description
The vulnerability allows a remote attacker to write arbitrary files and potentially execute arbitrary code.
The vulnerability exists due to path traversal in archive extraction utilities when processing a specially crafted archive from an external update endpoint. A remote attacker can serve a specially crafted archive to write arbitrary files and potentially execute arbitrary code.
Only deployments with the GeoIP database downloader enabled and configured to use an external update endpoint are affected. In certain configurations, exploitation can be escalated when automatic pipeline configuration reloading is enabled and the pipeline configuration directory is writable by the Logstash process.