CVE-2026-33459
Received Received - Intake
Uncontrolled Resource Consumption in Kibana Causes Denial of Service

Publication date: 2026-04-08

Last updated on: 2026-04-13

Assigner: Elastic

Description
Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130). An authenticated user with access to the automatic import feature can submit specially crafted requests with excessively large input values. When multiple such requests are sent concurrently, the backend services become unstable, resulting in service disruption and deployment unavailability for all users.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
elastic kibana From 9.0.0 (inc) to 9.2.8 (exc)
elastic kibana From 9.3.0 (inc) to 9.3.3 (exc)
elastic kibana From 8.15.0 (inc) to 8.19.14 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33459 is an Uncontrolled Resource Consumption vulnerability (CWE-400) in Kibana versions 8.15.0 through 8.19.13, 9.0.0 through 9.2.7, and 9.3.0 through 9.3.2. It allows an authenticated user with Fleet and Integrations privileges to cause a denial of service by exploiting the automatic import feature.

The attacker submits specially crafted requests containing excessively large input values. When multiple such requests are sent concurrently, the backend services become unstable due to excessive allocation of resources (CAPEC-130), leading to service disruption and unavailability for all users.

This vulnerability affects deployments where the automatic import plugin is enabled, which is the default setting in Kibana 8.15 and later.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability causes denial of service by making Kibana backend services unstable and unavailable, impacting service availability.

While the CVE description and resources do not explicitly mention compliance with standards like GDPR or HIPAA, the high availability impact could indirectly affect compliance requirements that mandate continuous service availability and reliability.

There is no indication that confidentiality or integrity of data is affected, which are critical factors in GDPR and HIPAA compliance.


How can this vulnerability impact me? :

This vulnerability can lead to a denial of service (DoS) condition in Kibana deployments by causing backend services to become unstable and unavailable.

  • Service disruption and deployment unavailability for all users.
  • Indicators of compromise include repeated or concurrent requests with large payloads to automatic import endpoints, high-volume request patterns in audit and HTTP access logs, and HTTP 502 errors signaling resource exhaustion.

The impact is rated as high availability impact with no confidentiality or integrity loss.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for indicators of compromise such as repeated or concurrent requests with large payloads to automatic import endpoints from the same user or session.

You should look for patterns of high-volume requests in Kibana audit and HTTP access logs, as well as HTTP 502 errors which signal resource exhaustion.

Commands to detect this might include searching your logs for large payload requests and HTTP 502 errors related to automatic import endpoints. For example, using grep or similar tools to find large request payloads or error codes in your Kibana logs.

  • grep -i 'automatic_import' /var/log/kibana/access.log | grep -E 'POST|PUT' | awk '{print $0}'
  • grep '502' /var/log/kibana/error.log
  • Analyze audit logs for repeated requests from the same user/session with large payload sizes.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating Kibana to a fixed version where the vulnerability is resolved.

  • Upgrade to Kibana versions 8.19.14, 9.2.8, or 9.3.3 or later.
  • If upgrading immediately is not possible, consider disabling the automatic import plugin temporarily, as the vulnerability affects deployments where this plugin is enabled.
  • Monitor and restrict authenticated users with Fleet and Integrations privileges from submitting large or excessive requests to the automatic import feature.

Elastic Cloud Serverless environments have been patched prior to public disclosure, so using such environments or applying similar continuous deployment practices can also help mitigate risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart