Cyber Posture

CVE-2025-25015

Critical

Published: 05 March 2025

Published
05 March 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0074 72.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-25015 is a prototype pollution vulnerability in Kibana that enables arbitrary code execution through a crafted file upload combined with specifically crafted HTTP requests. The vulnerability affects Kibana versions 8.15.0 and later up to but not including 8.17.1, as well as versions 8.17.1 and 8.17.2. It is classified under CWE-1321 and carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity with network accessibility, low attack complexity, low privileges required, no user interaction, and high impact across confidentiality, integrity, and availability in a high-scope scenario.

The vulnerability can be exploited by authenticated users depending on the Kibana version. In versions from 8.15.0 up to but not including 8.17.1, users with the Viewer role can trigger it remotely. In versions 8.17.1 and 8.17.2, exploitation requires users with roles granting all of the following privileges: fleet-all, integrations-all, and actions:execute-advanced-connectors. Successful exploitation leads to arbitrary code execution on the Kibana server.

The Elastic Security Advisory ESA-2025-06, detailed at https://discuss.elastic.co/t/kibana-8-17-3-8-16-6-security-update-esa-2025-06/375441, addresses this issue with security updates for Kibana versions 8.17.3 and 8.16.6, recommending upgrades to these patched releases for mitigation.

Details

CWE(s)
CWE-1321

Affected Products

elastic
kibana
8.15.0 — 8.16.6 · 8.17.0 — 8.17.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Prototype pollution vulnerability enables RCE on public-facing Kibana server via crafted requests/file upload; directly supports T1190 for exploiting the application and T1068 for escalating from low-priv roles (e.g., Viewer) to full code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References