Elastic Vulnerabilities
Comprehensive security vulnerability database for Elastic products
5
0
3
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-26938 | 7.7 | This vulnerability allows an attacker with specific permissions in Kibana to read any file on the server and potentially make unauthorized requests to other servers. To exploit this, the attacker must be an authenticated user with the ability to execute workflows. | elastickibana | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-26937 | 7.5 | This vulnerability allows an attacker to overload the Kibana service, causing it to become unresponsive, effectively leading to a Denial of Service. It can be exploited by sending specially crafted input data to the Timelion component, which means that the attacker needs to have access to the Kibana interface to trigger the issue. | elastickibana | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-26936 | 7.5 | This vulnerability allows an attacker to cause Kibana to crash or become unresponsive by sending specially crafted input that triggers excessive processing in the system's regular expressions. To exploit this, the attacker needs access to the AI Inference Anonymization Engine, which may be exposed through user inputs or API calls. | elastickibana | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26935 | 7.5 | This vulnerability allows an attacker to crash the Kibana service by sending specially crafted input to its search feature, which can overwhelm the system. To exploit this, the attacker needs access to the internal Content Connectors endpoint, making it critical to secure that part of the application. | elastickibana | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26934 | 6.5 | An attacker with view-only access to Kibana can exploit this vulnerability to send specially crafted data that overwhelms the system, causing it to crash or become unresponsive. This means that even users who are not fully authorized can disrupt the service by manipulating input data. | elastickibana | Exploit Available | about 1 month agoFeb 26, 2026 |
About Elastic Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Elastic products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.