Description
External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modify connectors (Alerts & Connectors: All). The server processes a configuration without proper validation, allowing for arbitrary network requests and for arbitrary file reads.
Published: 2026-01-14
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file disclosure via privileged connector configuration
Action: Patch Immediately
AI Analysis

Impact

The vulnerability arises from a combination of external control of file name or path (CWE‑73) and server‑side request forgery (CWE‑918). An attacker who can create or modify the Google Gemini connector configuration can craft a credentials JSON payload that causes the Kibana server to read arbitrary files from the file system or initiate unauthorized network requests. The result is a breach of confidentiality for files that can be accessed by the web process, potentially exposing sensitive configuration data such as credentials.

Affected Systems

The flaw affects Elastic Kibana deployments that incorporate the Google Gemini connector. No specific patch versions are listed in the vendor advisory, which implies that all versions using the connector are vulnerable until a corresponding security update is installed. Administrators should review their Kibana installations to confirm whether the connector is present and operating.

Risk and Exploitability

The CVSS v3.1 score of 8.6 classifies the vulnerability as high severity. The EPSS score of less than 1 % indicates a low probability of exploitation at the time of analysis, and the vulnerability is not included in the CISA KEV catalog. Exploitation requires authenticated write access to connector configurations, so the risk is significant for environments where privileged roles are broad or poorly segregated. Attackers could therefore leverage the flaw to exfiltrate arbitrary files or trigger outbound network traffic from the Kibana host.

Generated by OpenCVE AI on April 18, 2026 at 06:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official Elastic Kibana security update that addresses the Google Gemini connector flaw (refer to the 8.19.10‑9.1‑10.9.2 security advisories).
  • If the connector is not required for business functions, disable or remove it from the Kibana configuration to eliminate the attack surface.
  • Restrict the roles that can create or modify connectors to a minimal set of trusted administrators to reduce the attacker's ability to craft malicious configurations.

Generated by OpenCVE AI on April 18, 2026 at 06:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 16 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 15 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic kibana
Vendors & Products Elastic
Elastic kibana

Wed, 14 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 10:30:00 +0000

Type Values Removed Values Added
Description External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modify connectors (Alerts & Connectors: All). The server processes a configuration without proper validation, allowing for arbitrary network requests and for arbitrary file reads.
Title External Control of File Name or Path and Server-Side Request Forgery (SSRF) in Kibana Google Gemini Connector
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2026-01-14T16:18:47.674Z

Reserved: 2025-12-19T16:02:39.148Z

Link: CVE-2026-0532

cve-icon Vulnrichment

Updated: 2026-01-14T16:18:35.826Z

cve-icon NVD

Status : Deferred

Published: 2026-01-14T11:15:50.510

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0532

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-14T10:14:57Z

Links: CVE-2026-0532 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:30:25Z

Weaknesses