Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* cpe:2.3:a:elastic:kibana:8.18.0:*:*:*:*:*:*:* cpe:2.3:a:elastic:kibana:9.0.0:-:*:*:*:*:*:* |
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 06 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 06 May 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints. | |
Title | Kibana arbitrary code execution via prototype pollution | |
Weaknesses | CWE-1321 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2025-05-07T03:56:07.873Z
Reserved: 2025-01-31T15:28:16.917Z
Link: CVE-2025-25014

Updated: 2025-05-06T17:48:46.590Z

Status : Analyzed
Published: 2025-05-06T18:15:37.857
Modified: 2025-10-02T16:26:53.280
Link: CVE-2025-25014

No data.

Updated: 2025-07-13T11:07:08Z