5
0
3
0
Vulnerability Timeline
5 vulnerabilities discovered over time for Kibana
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-26938 | 7.7 | This vulnerability allows an attacker with specific permissions in Kibana to read any file on the server and potentially make unauthorized requests to other servers. To exploit this, the attacker must be an authenticated user with the ability to execute workflows. | elastickibana | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-26937 | 7.5 | This vulnerability allows an attacker to overload the Kibana service, causing it to become unresponsive, effectively leading to a Denial of Service. It can be exploited by sending specially crafted input data to the Timelion component, which means that the attacker needs to have access to the Kibana interface to trigger the issue. | elastickibana | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-26936 | 7.5 | This vulnerability allows an attacker to cause Kibana to crash or become unresponsive by sending specially crafted input that triggers excessive processing in the system's regular expressions. To exploit this, the attacker needs access to the AI Inference Anonymization Engine, which may be exposed through user inputs or API calls. | elastickibana | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26935 | 7.5 | This vulnerability allows an attacker to crash the Kibana service by sending specially crafted input to its search feature, which can overwhelm the system. To exploit this, the attacker needs access to the internal Content Connectors endpoint, making it critical to secure that part of the application. | elastickibana | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26934 | 6.5 | An attacker with view-only access to Kibana can exploit this vulnerability to send specially crafted data that overwhelms the system, causing it to crash or become unresponsive. This means that even users who are not fully authorized can disrupt the service by manipulating input data. | elastickibana | Exploit Available | about 1 month agoFeb 26, 2026 |
About Elastic Kibana Security
This page provides comprehensive security vulnerability tracking for Elastic Kibana. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Kibana updated to the latest version
- • Subscribe to security advisories from Elastic
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately