Cyber Posture

CVE-2026-4498

High

Published: 08 April 2026

Published
08 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0006 19.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4498 is a high-severity Execution with Unnecessary Privileges (CWE-250) vulnerability in Elastic Kibana. Its CVSS base score is 7.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-6 enforces least privilege, directly countering CWE-250 by ensuring Kibana’s Fleet plugin debug route handlers do not execute with unnecessary privileges that bypass Elasticsearch RBAC.

prevent

AC-3 mandates enforcement of access control policies, preventing authenticated users from reading Elasticsearch index data beyond their RBAC scope via privilege abuse in debug handlers.

prevent

SI-2 requires timely remediation of flaws, such as applying Elastic's patches for affected Kibana versions to eliminate the unnecessary privileges vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

Vulnerability in Kibana web app debug handlers enables exploitation of public-facing application for unauthorized access; directly facilitates collection of data from databases (Elasticsearch indices) via RBAC bypass.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents,…

more

agent policies, and settings management).

Deeper analysisAI

CVE-2026-4498 is an Execution with Unnecessary Privileges vulnerability (CWE-250) present in Kibana’s Fleet plugin debug route handlers. This flaw affects Kibana and allows reading Elasticsearch index data beyond the user's direct RBAC scope through privilege abuse (CAPEC-122). Published on 2026-04-08, it carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N), indicating high confidentiality impact with changed scope.

An authenticated Kibana user possessing Fleet sub-feature privileges—such as those for agents, agent policies, and settings management—can exploit this vulnerability. By abusing the debug route handlers, the attacker gains unauthorized read access to Elasticsearch index data outside their assigned RBAC permissions, potentially exposing sensitive information across the network with low complexity and no user interaction required.

Elastic's security advisory ESA-2026-21 details patches for affected Kibana versions, including 8.19.4, 9.2.8, and 9.3.3. Security practitioners should consult https://discuss.elastic.co/t/kibana-8-19-14-9-2-8-9-3-3-security-update-esa-2026-21/385811 for mitigation guidance, upgrade instructions, and additional remediation steps.

Details

CWE(s)

Affected Products

elastic
kibana
8.0.0 — 8.19.14 · 9.0.0 — 9.2.8 · 9.3.0 — 9.3.3

CVEs Like This One

CVE-2025-25015Same product: Elastic Kibana
CVE-2026-26938Same product: Elastic Kibana
CVE-2026-33461Same product: Elastic Kibana
CVE-2026-0528Same product: Elastic Kibana
CVE-2026-33458Same product: Elastic Kibana
CVE-2026-26935Same product: Elastic Kibana
CVE-2024-43707Same product: Elastic Kibana
CVE-2026-26937Same product: Elastic Kibana
CVE-2026-26936Same product: Elastic Kibana
CVE-2026-33466Same vendor: Elastic

References