Incorrect Authorization Affecting kibana package, versions >=9.0.0 <9.0.6>=9.1.0 <9.1.3


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-KIBANA-13706605
  • published27 Oct 2025
  • disclosed28 Aug 2025
  • creditUnknown

Introduced: 28 Aug 2025

CVE-2025-25010  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade kibana to version 9.0.6, 9.1.3 or higher.

Overview

kibana is an open source (Apache Licensed), browser-based analytics and search dashboard for Elasticsearch.

Affected versions of this package are vulnerable to Incorrect Authorization via the built-in reporting_user role, which is incorrectly grants access to all Spaces. An attacker can gain unauthorized access to restricted resources by leveraging this role assignment.

Note:

This vulnerability does not violate configured index privileges. Users with the reporting_user role assigned will not have access to any additional user documents or indices. They will be able to access the aforementioned Kibana assets, but not the data within, unless their existing index privileges would otherwise grant access.

##Workaround

Administrators should revoke the reporting_user role from their end users, and instead grant access to reporting functionality via custom roles which grant the appropriate access to reporting.

References

CVSS Base Scores

version 4.0
version 3.1