Unrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victim’s browser (XSS) via crafted HTML and JavaScript files.
The attacker must have access to the Synthetics app AND/OR have access to write to the synthetics indices.
References
Link | Resource |
---|---|
https://discuss.elastic.co/t/kibana-7-17-24-and-8-12-0-security-update-esa-2024-20/377712 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Oct 2025, 19:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | |
References | () https://discuss.elastic.co/t/kibana-7-17-24-and-8-12-0-security-update-esa-2024-20/377712 - Patch, Vendor Advisory | |
Summary |
|
|
First Time |
Elastic
Elastic kibana |
01 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 14:15
Updated : 2025-10-01 19:29
NVD link : CVE-2024-11390
Mitre link : CVE-2024-11390
CVE.ORG link : CVE-2024-11390
JSON object : View
Products Affected
elastic
- kibana
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type