vulnerability
Elastic Kibana: CVE-2019-7610: Improper Control of Generation of Code
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Mar 25, 2019 | Sep 3, 2025 | Sep 3, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Mar 25, 2019
Added
Sep 3, 2025
Modified
Sep 3, 2025
Description
Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
Solution
elastic-kibana-upgrade-latest
References
- CWE-94
- CWE-77
- CVE-2019-7610
- https://attackerkb.com/topics/CVE-2019-7610
- URL-https://access.redhat.com/errata/RHBA-2019:2824
- URL-https://access.redhat.com/errata/RHSA-2019:2860
- URL-https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077
- URL-https://www.elastic.co/community/security
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.