CVE-2025-25012
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-25

Last updated on: 2025-09-30

Assigner: Elastic

Description
URL redirection to an untrusted site ('Open Redirect') in Kibana can lead to sending a user to an arbitrary site and server-side request forgery via a specially crafted URL.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-25
Last Modified
2025-09-30
Generated
2026-05-07
AI Q&A
2025-06-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
elastic kibana From 7.0.0 (inc) to 7.17.29 (exc)
elastic kibana From 8.0.0 (inc) to 8.17.8 (exc)
elastic kibana From 8.18.0 (inc) to 8.18.3 (exc)
elastic kibana From 9.0.0 (inc) to 9.0.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-25012 is an Open Redirect vulnerability in Kibana that allows attackers to redirect users to arbitrary, untrusted external websites via specially crafted URLs. Additionally, it can enable server-side request forgery (SSRF) attacks. This issue affects Kibana versions up to 7.17.28, 8.0.0 through 8.17.7, 8.18.0 through 8.18.2, and 9.0.0 through 9.0.2, particularly when using Short URLs in the Discover, Dashboard, and Visualization Library features. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by causing users of Kibana to be redirected to malicious or untrusted external sites without their consent, potentially exposing them to phishing or other attacks. It also allows attackers to perform server-side request forgery (SSRF), which can be used to make unauthorized requests from the Kibana server, potentially leading to further exploitation or information disclosure. The integrity of your Kibana environment could be compromised, although confidentiality and availability are not directly affected. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate CVE-2025-25012, immediately upgrade Kibana to versions 7.17.29, 8.17.8, 8.18.3, or 9.0.3 where the vulnerability is fixed. If upgrading is not possible, restrict access to features that allow Short URL generation. For Basic license users, restrict access to Dashboard, Discover, Visualize, and Saved Objects Management features, especially those with top-level 'All' privileges. For Gold, Platinum, or Enterprise licenses, use sub-feature privileges to prevent Short URL creation while maintaining read/write access. Cloud administrators should similarly restrict Short URL generation capabilities to mitigate risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart