Impact
The vulnerability is uncontrolled resource consumption in Kibana’s Timelion component. An attacker can supply crafted input to trigger excessive processing, leading to high CPU or memory usage and a denial of service. This weakness is classified as CWE‑400 and is achieved through input data manipulation (CAPEC‑153). The impact is a disruption of Kibana service availability for all users, while confidentiality and integrity remain unaffected.
Affected Systems
The flaw affects Elastic Kibana installations that include the Timelion feature. No specific version is listed, so any deployment that has not applied the latest security update could be vulnerable. Administrators should verify that they are running a patched version of Kibana in which Timelion has been hardened.
Risk and Exploitability
The CVSS base score is 6.5, indicating medium severity. The EPSS score is below 1 %, suggesting a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is HTTP requests targeting the Timelion component with malicious query data; the attacker needs network access to Kibana and knowledge of Timelion’s input syntax, but no elevated privileges are required. If an attacker can reach the service, they may cause service disruption without needing a separate compromise.
OpenCVE Enrichment