Elastic Security Updates Address File Theft and DoS Risks

Elastic Security Updates Address File Theft and DoS Risks

Elastic has released new security updates to fix multiple vulnerabilities across its platform, including a high-severity issue that could allow attackers to read arbitrary files from affected systems.

The vulnerabilities impact Kibana and related components, affecting how files, inputs, and system resources are handled. Elastic strongly recommends updating to the latest versions to reduce exposure.

Most Critical Issue: Arbitrary File Disclosure

The most serious flaw, tracked as CVE-2026-0532, affects connector configurations and combines two weaknesses: improper file path handling and server-side request forgery (SSRF).

An authenticated attacker with permission to create or modify connectors could abuse this flaw to trigger unauthorized network requests and read files from the underlying system. This issue has a CVSS score of 8.6, placing it in the high-severity category.

Vulnerability Summary

CVE IDIssue TypeSeverityCVSSAffected Versions
CVE-2026-0532File path control + SSRFHigh8.68.15.0–8.19.9, 9.0.0–9.2.3
CVE-2026-0543Input validation flaw (Email connector)Medium6.57.x, 8.0.0–8.19.9, 9.0.0–9.2.3
CVE-2026-0531Resource exhaustion (Fleet)Medium6.57.10.0+, 8.x, 9.x
CVE-2026-0530Resource exhaustion (Fleet)Medium6.57.10.0+, 8.x, 9.x

Email Connector and Fleet DoS Issues

Another issue, CVE-2026-0543, affects Kibana’s email connector. Improper input validation allows attackers with execution privileges to submit malformed email parameters, potentially exhausting memory and causing a denial-of-service (DoS) condition that requires manual intervention to recover.

In addition, two related flaws in Kibana Fleet (CVE-2026-0531 and CVE-2026-0530) allow logged-in users to trigger excessive resource usage through repeated requests. These flaws can also lead to service disruption, and no temporary workarounds are available.

Mitigation and Recommended Action

Elastic has released fixed versions and advises users to upgrade immediately to:

  • 8.19.10
  • 9.1.10
  • 9.2.4

Elastic Cloud Serverless deployments are not affected due to continuous updates. For self-managed environments where immediate upgrades are not possible, Elastic suggests restricting connector permissions and applying tighter access controls as a temporary risk reduction measure.

These vulnerabilities highlight the importance of regularly updating Elastic deployments, especially in environments that rely heavily on connectors and Fleet management. Organizations running affected versions should review their exposure and apply patches as soon as possible to prevent file disclosure or service disruption.

‍Follow Us on: Linkedin, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!