CVE-2026-33461
Incorrect Authorization in Kibana Fleet Leading to Information Disclosure
CVSS Score
7.7
EPSS Score
0.1%
EPSS Percentile
17th
Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122). A user with limited Fleet privileges can exploit an internal API endpoint to retrieve sensitive configuration data, including private keys and authentication tokens, that should only be accessible to users with higher-level settings privileges. The endpoint composes its response by fetching full configuration objects and returning them directly, bypassing the authorization checks enforced by the dedicated settings APIs.
| CWE | CWE-863 |
| Vendor | elastic |
| Product | kibana |
| Published | Apr 8, 2026 |
| Last Updated | Apr 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for elastic kibana
Be the first to know when new high vulnerabilities affecting elastic kibana are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
Elastic / Kibana
9.3.0 โค 9.3.2 9.0.0 โค 9.2.7 8.0.0 โค 8.19.13