vulnerability
Arch Linux: Arbitrary code execution (CVE-2019-7610)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Mar 25, 2019 | Jul 11, 2025 | Nov 27, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Mar 25, 2019
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-7610
- https://attackerkb.com/topics/CVE-2019-7610
- URL-https://access.redhat.com/errata/RHBA-2019:2824
- URL-https://access.redhat.com/errata/RHSA-2019:2860
- URL-https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077
- URL-https://security.archlinux.org/ASA-201902-26
- URL-https://www.elastic.co/community/security
- CWE-94
- CWE-77
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.