External Control of File Name or Path Affecting kibana package, versions >=8.15.0 <8.19.10>=9.0.0 <9.1.10>=9.2.0 <9.2.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-KIBANA-14927422
  • published16 Jan 2026
  • disclosed14 Jan 2026
  • creditUnknown

Introduced: 14 Jan 2026

CVE-2026-0532  (opens in a new tab)
CWE-73  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade kibana to version 8.19.10, 9.1.10, 9.2.4 or higher.

Overview

kibana is an open source (Apache Licensed), browser-based analytics and search dashboard for Elasticsearch.

Affected versions of this package are vulnerable to External Control of File Name or Path via the processing of JSON credentials in the Google Gemini connector configuration. An attacker can access arbitrary files and perform unauthorized network requests by submitting malicious input to the connectors.

References

CVSS Base Scores

version 4.0
version 3.1