Description
Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130). An authenticated user with access to the automatic import feature can submit specially crafted requests with excessively large input values. When multiple such requests are sent concurrently, the backend services become unstable, resulting in service disruption and deployment unavailability for all users.
Published: 2026-04-08
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

Uncontrolled Resource Consumption (CWE-400) in Kibana allows an authenticated user with access to the automatic import feature to submit specially crafted requests containing excessively large input values. When multiple such requests are executed concurrently, the backend services become unstable, causing service disruption and rendering the deployment unavailable for all users. The impact is a denial of service that can affect system availability for all users of the affected Kibana deployment.

Affected Systems

The vulnerability is reported in Elastic Kibana. No specific versions are listed in the official CNA data; however, the security update references Kibana 8.19.14, 9.2.8, and 9.3.3, implying that those releases, and potentially other current versions, are affected until patched. This affects all installations that enable the automatic import feature and have authenticated users capable of invoking it.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog. Exploitation requires valid credentials with import rights, so an attacker must first authenticate. Once authenticated, the attacker can trigger the denial of service through concurrent large‑payload requests. The main risk lies in availability loss for the Kibana service and potential cascading impact on dependent systems.

Generated by OpenCVE AI on April 13, 2026 at 19:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Kibana to the latest patched release (at least 8.19.14, 9.2.8, or 9.3.3).
  • If an immediate upgrade is not feasible, restrict or disable the automatic import feature for users without a legitimate need.

Generated by OpenCVE AI on April 13, 2026 at 19:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic kibana
Vendors & Products Elastic
Elastic kibana

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130). An authenticated user with access to the automatic import feature can submit specially crafted requests with excessively large input values. When multiple such requests are sent concurrently, the backend services become unstable, resulting in service disruption and deployment unavailability for all users.
Title Uncontrolled Resource Consumption in Kibana Leading to Denial of Service
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2026-04-09T14:24:44.912Z

Reserved: 2026-03-20T10:53:23.099Z

Link: CVE-2026-33459

cve-icon Vulnrichment

Updated: 2026-04-09T14:24:40.933Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T18:26:00.407

Modified: 2026-04-13T18:21:25.010

Link: CVE-2026-33459

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:38:13Z

Weaknesses