Impact
The vulnerability stems from improper input validation in Kibana's Email Connector. When a special email address payload is supplied, the application attempts to process the malformed data, which triggers an excessive allocation fault. As a result, the Kibana service becomes completely unavailable to all users until it is manually restarted. The weakness aligns with CWE-20 (Input Validation) and CWE-770 (Excessive Allocation).
Affected Systems
The affected product is Elastic's Kibana. No specific version range is listed in the available data; users should check for the latest 8.19.x releases and beyond. The attack requires an authenticated user who holds at least view-level privileges and is authorized to execute connector actions.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. The EPSS score is reported as less than 1 %, implying a very low probability of exploitation in the wild. The vulnerability is not catalogued in the CISA KEV list, further reducing its exposure. Attackers need valid credentials and sufficient role privileges, meaning the threat is primarily from internal or compromised accounts rather than external anonymous actors. If exploited, the service will experience a denial of service until a manual restart is applied.
OpenCVE Enrichment