Description
Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.
Published: 2026-02-26
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Server-Side Request Forgery with arbitrary file read
Action: Immediate Patch
AI Analysis

Impact

Improper neutralization of special elements in the Kibana Workflow template engine permits code injection, enabling a malicious actor to read any file on the Kibana server and perform server‑side request forgery. The vulnerability stems from insufficient sanitization of user‐supplied template content, a classic example of CWE‑1336. Exploiting it can leak sensitive configuration data, compromise internal services, or expose unintended network resources.

Affected Systems

Elastic Kibana version 9.3.0, specifically the Workflows feature, is affected. An authenticated user possessing the workflowsManagement:executeWorkflow privilege is required to trigger the flaw. The reference advisory indicates that upgrade to Kibana 9.3.1 or later mitigates the issue.

Risk and Exploitability

The CVSS score of 8.6 classifies this flaw as high impact, capable of affecting confidentiality, integrity, and availability of the Kibana instance. The EPSS probability is listed as <1%, suggesting limited real‑world exploitation risk at the time of analysis. The vulnerability is not registered in CISA’s KEV catalog. Attackers must be authenticated but can be external if credentials are compromised, and the flaw allows arbitrary file reads and SSRF to internal or external targets.

Generated by OpenCVE AI on April 17, 2026 at 14:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kibana to version 9.3.1 or later to patch the template engine sanitization flaw.
  • Restrict the workflowsManagement:executeWorkflow privilege to only trusted users and, if possible, remove it from default roles.
  • Configure Kibana’s outbound network settings or a firewall to block unintended SSRF targets and monitor workflow execution logs for suspicious activity.

Generated by OpenCVE AI on April 17, 2026 at 14:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:elastic:kibana:9.3.0:*:*:*:*:*:*:*

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic kibana
Vendors & Products Elastic
Elastic kibana

Thu, 26 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.
Title Improper Neutralization of Special Elements Used in a Template Engine in Kibana Workflows Leading to Server-Side Request Forgery (SSRF)
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2026-02-27T16:03:59.847Z

Reserved: 2026-02-16T16:42:05.774Z

Link: CVE-2026-26938

cve-icon Vulnrichment

Updated: 2026-02-27T16:03:55.940Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T19:32:39.903

Modified: 2026-03-02T15:40:36.893

Link: CVE-2026-26938

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:30:20Z

Weaknesses