Логотип exploitDog
bind:CVE-2026-26938
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-26938

Количество 3

Количество 3

nvd логотип

CVE-2026-26938

около 1 месяца назад

Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2026-26938

около 1 месяца назад

Improper Neutralization of Special Elements Used in a Template Engine ...

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-9674-77c9-4xpr

около 1 месяца назад

Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-26938

Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.

CVSS3: 8.6
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-26938

Improper Neutralization of Special Elements Used in a Template Engine ...

CVSS3: 8.6
0%
Низкий
около 1 месяца назад
github логотип
GHSA-9674-77c9-4xpr

Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.

CVSS3: 8.6
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу