EUVD-2026-20528

| CVE-2026-4498 HIGH
2026-04-08 elastic GHSA-4c73-92cw-x6vq
7.7
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Apr 08, 2026 - 17:16 vuln.today
EUVD ID Assigned
Apr 08, 2026 - 17:16 euvd
EUVD-2026-20528
CVE Published
Apr 08, 2026 - 16:38 nvd
HIGH 7.7

Description

Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents, agent policies, and settings management).

Analysis

Authenticated Kibana users with Fleet management privileges can read Elasticsearch index data beyond their intended RBAC permissions through debug route handlers in the Fleet plugin. This scope bypass affects Elastic Kibana deployments where users hold Fleet sub-feature privileges (agent policies, settings management). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and document all Kibana users granted Fleet sub-feature privileges (agent policies, settings management) using role audit logs. Within 7 days: Review access logs for suspicious data queries from Fleet-privileged accounts and disable unnecessary Fleet privileges pending patch availability; implement network segmentation to restrict Kibana access to only required personnel. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2026-20528 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy