Description
Improper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed payloads sent to the Graphite server metricset or Zookeeper server metricset. Additionally, Improper Input Validation (CWE-20) exists in the Prometheus helper module that can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed metric data.
Published: 2026-01-13
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

Improper validation of array indices and generic input validation flaws in Metricbeat can allow an attacker to send specially crafted, malformed metric data that makes the service consume excessive resources and ultimately fail to respond. The vulnerability resides in the Graphite and Zookeeper metric sets as well as the Prometheus helper module, enabling a denial‑of‑service attack via input data manipulation.

Affected Systems

Elastic Metricbeat deployments are affected, especially those using the Graphite or Zookeeper metric sets or the Prometheus helper module. All versions prior to the security update 8.19.10‑9.1‑10.9‑2‑4 lack the necessary checks and are vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity, while an EPSS of less than 1% suggests a low chance of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote, achievable by any actor that can transmit metric data to a Metricbeat instance – for example, a malicious data source sending crafted payloads to the Graphite, Zookeeper, or Prometheus endpoints.

Generated by OpenCVE AI on April 18, 2026 at 06:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Metricbeat to version 8.19.10‑9.1‑10.9‑2‑4 or later to apply the array‑index validation patch.
  • Limit access to the metric ingestion endpoints (Graphite, Zookeeper, Prometheus) so that only trusted sources can send data, using firewall or IP filtering.
  • Monitor Metricbeat logs and metrics for abnormal ingestion patterns and configure alerts for potential denial‑of‑service attempts.

Generated by OpenCVE AI on April 18, 2026 at 06:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w2gr-585j-r428 Metricbeat affected by multiple denial of service vulnerabilities
History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Elastic kibana
CPEs cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
Vendors & Products Elastic kibana

Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic metricbeat
Vendors & Products Elastic
Elastic metricbeat

Tue, 13 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description Improper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed payloads sent to the Graphite server metricset or Zookeeper server metricset. Additionally, Improper Input Validation (CWE-20) exists in the Prometheus helper module that can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed metric data.
Title Improper Input Validation in Metricbeat Leading to Denial of Service
Weaknesses CWE-129
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Elastic Kibana Metricbeat
cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2026-01-13T21:25:10.446Z

Reserved: 2025-12-19T15:27:18.049Z

Link: CVE-2026-0528

cve-icon Vulnrichment

Updated: 2026-01-13T21:25:03.101Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T21:15:50.647

Modified: 2026-01-22T19:57:29.927

Link: CVE-2026-0528

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:30:25Z

Weaknesses