Kibana 7.x / 8.x < 8.19.10 / 9.1.x < 9.1.10 / 9.2.x < 9.2.4 (ESA_2026_08)

medium Nessus Plugin ID 286274

Synopsis

The remote host is missing a security update.

Description

The version of Kibana installed on the remote host is prior to 8.19.10, 9.1.10, or 9.2.4. It is, therefore, affected by a vulnerability as referenced in the ESA_2026_08 advisory.

- An improper input validation vulnerability in Kibana's Email Connector can allow an attacker to cause an excessive allocation through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. Successful exploitation results in complete service unavailability for all users until a manual restart is performed. This affects all Kibana 7.x versions, 8.x versions from 8.0.0 to 8.19.9, 9.x versions from 9.0.0 to 9.1.9, and 9.2.0 to 9.2.3. (CVE-2026-0543)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update to Kibana version 8.19.10, 9.1.10, 9.2.4 or later.

See Also

http://www.nessus.org/u?afe62cf4

Plugin Details

Severity: Medium

ID: 286274

File Name: kibana_esa_2026_08.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 1/15/2026

Updated: 1/16/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2026-0543

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/a:elasticsearch:kibana

Required KB Items: installed_sw/Kibana

Exploit Ease: No known exploits are available

Patch Publication Date: 1/6/2026

Vulnerability Publication Date: 1/13/2026

Reference Information

CVE: CVE-2026-0543

IAVB: 2026-B-0015