CVE-2026-0543
EUVD-2026-203513.01.2026, 21:15
Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| elastic | kibana | 7.0.0 ≤ 𝑥 ≤ 7.17.29 |
| elastic | kibana | 8.0.0 ≤ 𝑥 < 8.19.0 |
| elastic | kibana | 9.0.0 ≤ 𝑥 < 9.1.10 |
| elastic | kibana | 9.2.0 ≤ 𝑥 < 9.2.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-770 - Allocation of Resources Without Limits or ThrottlingThe software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.