CVE-2025-68386
MEDIUMDescription
Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to change a document's sharing type to "global," even though they do not have permission to do so, making it visible to everyone in the space via a crafted a HTTP request.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| elastic | kibana |
| elastic | kibana |
| elastic | kibana |
| elastic | kibana |
References
Frequently Asked Questions
What is CVE-2025-68386? +
How severe is CVE-2025-68386? +
What products are affected by CVE-2025-68386? +
How do I check if I'm vulnerable to CVE-2025-68386? +
Related Vulnerabilities
Data Space Portal is an open-source Software as a Service (SaaS) solution designed to streamline Dataspace management. From version 2.1.1 …
Kirby is an open-source content management system. Prior to versions 4.9.0 and 5.4.0, `pages.access/list` and `files.access/list` permissions are not consistently …
A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default …
The vulnerability allows an unauthenticated attacker to access information in PAM database.
An error when handling authorization related to the import / export interfaces on the RISC Platform prior to the saas-2021-12-29 …
This vulnerability exists in the CAP back office application due to improper authorization checks on certain API endpoints. An authenticated …