Unrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victim’s browser (XSS) via crafted HTML and JavaScript files.
The attacker must have access to the Synthetics app AND/OR have access to write to the synthetics indices.
References
| Link | Resource |
|---|---|
| https://discuss.elastic.co/t/kibana-7-17-24-and-8-12-0-security-update-esa-2024-20/377712 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Oct 2025, 19:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | |
| References | () https://discuss.elastic.co/t/kibana-7-17-24-and-8-12-0-security-update-esa-2024-20/377712 - Patch, Vendor Advisory | |
| First Time |
Elastic kibana
Elastic |
02 May 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 14:15
Updated : 2025-10-01 19:29
NVD link : CVE-2024-11390
Mitre link : CVE-2024-11390
CVE.ORG link : CVE-2024-11390
JSON object : View
Products Affected
elastic
- kibana
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
