Description
Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents, agent policies, and settings management).
Published: 2026-04-08
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Exposure
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in Kibana’s Fleet plugin debug route handlers. The issue is a privilege abuse flaw (CWE‑250) that allows the plugin to read Elasticsearch index data beyond the limits set by the user’s RBAC permissions. When triggered, an attacker could retrieve sensitive search results or configuration information that should be restricted, effectively exposing protected data within the cluster.

Affected Systems

This impact applies to installations of Kibana that include the Fleet feature. The CNA identified Elastic:Kibana as the affected vendor and product, but no specific version numbers were supplied, indicating that any current or future releases containing these debug route handlers might be vulnerable until a fix is applied. Users operating within the Elastic distribution are therefore at risk if they enable the Fleet feature without applying the latest security update.

Risk and Exploitability

The CVSS base score of 7.7 signals a high severity, while the EPSS score of less than 1% suggests that exploitation in the wild is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is authenticated access to Kibana’s web interface with sufficient Fleet sub‑feature privileges (agents, agent policies, or settings management). An attacker who meets these prerequisites can invoke the debug routes to read arbitrary index data, representing a direct privilege escalation within a legitimate user session.

Generated by OpenCVE AI on April 13, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kibana to the version referenced in Elastic Security Advisory ESA‑2026‑21, which contains the fix for the Fleet plugin privilege abuse.
  • If an upgrade cannot be performed immediately, disable or remove the Fleet plugin’s debug route handlers to block the exploitation pathway.
  • Review and tighten Elasticsearch RBAC roles and ensure that users granted Fleet sub‑feature privileges adhere to least‑privilege principles.

Generated by OpenCVE AI on April 13, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Elastic
Elastic kibana
Vendors & Products Elastic
Elastic kibana

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents, agent policies, and settings management).
Title Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope
Weaknesses CWE-250
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2026-04-09T14:27:38.420Z

Reserved: 2026-03-20T10:53:18.459Z

Link: CVE-2026-4498

cve-icon Vulnrichment

Updated: 2026-04-09T14:27:34.623Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T17:21:24.300

Modified: 2026-04-13T18:22:55.253

Link: CVE-2026-4498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:38:14Z

Weaknesses