CVE-2026-0528
Published: 13 January 2026
Summary
CVE-2026-0528 is a medium-severity Improper Validation of Array Index (CWE-129) vulnerability in Elastic Kibana. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 16.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes exploitation of input validation flaws in Metricbeat to crash the process via crafted network payloads, directly matching application exploitation for endpoint DoS.
NVD Description
Improper Validation of Array Index (CWE-129) exists in Metricbeat can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed payloads sent to the Graphite server metricset or Zookeeper server metricset. Additionally,…
more
Improper Input Validation (CWE-20) exists in the Prometheus helper module that can allow an attacker to cause a Denial of Service through Input Data Manipulation (CAPEC-153) via specially crafted, malformed metric data.
Deeper analysisAI
CVE-2026-0528 is an Improper Validation of Array Index vulnerability (CWE-129) in Metricbeat's Graphite server metricset and Zookeeper server metricset, along with an Improper Input Validation issue (CWE-20) in the Prometheus helper module. These flaws affect Metricbeat, a component of the Elastic Stack used for collecting and shipping metrics. Published on 2026-01-13, the vulnerability has a CVSS v3.1 base score of 6.5 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating medium severity with high availability impact but no confidentiality or integrity effects.
An attacker with adjacent network access can exploit these issues without privileges or user interaction by sending specially crafted, malformed payloads to the Graphite or Zookeeper server metricsets, or malformed metric data to the Prometheus helper module. This enables a Denial of Service (DoS) through input data manipulation (CAPEC-153), potentially crashing the affected Metricbeat instance and disrupting metric collection.
Elastic's security advisory at https://discuss.elastic.co/t/metricbeat-8-19-10-9-1-10-9-2-4-security-update-esa-2026-01/384519 details a security update for Metricbeat versions including 8.19.1, 10.9.1, and 10.9.2.4, providing patches to mitigate the vulnerabilities.
Details
- CWE(s)