VYPR

Maven package

org.elasticsearch/elasticsearch

pkg:maven/org.elasticsearch/elasticsearch

Vulnerabilities (44)

  • CVE-2025-37731Dec 15, 2025
    affected >= 7.0.0-alpha1, < 8.19.8fixed 8.19.8

    Improper Authentication in Elasticsearch PKI realm can lead to user impersonation via specially crafted client certificates. A malicious actor would need to have such a crafted client certificate signed by a legitimate, trusted Certificate Authority.

  • CVE-2025-37727Oct 10, 2025
    affected >= 7.0.0, < 8.18.8fixed 8.18.8

    Insertion of sensitive information in log file in Elasticsearch can lead to loss of confidentiality under specific preconditions when auditing requests to the reindex API https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-reindex

  • CVE-2024-52979May 1, 2025
    affected < 7.17.25fixed 7.17.25

    Uncontrolled Resource Consumption in Elasticsearch while evaluating specifically crafted search templates with Mustache functions can lead to Denial of Service by causing the Elasticsearch node to crash.

  • CVE-2024-52981Apr 8, 2025
    affected >= 7.17.0, < 7.17.24fixed 7.17.24

    An issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow.

  • CVE-2024-52980Apr 8, 2025
    affected >= 7.17.0, < 8.15.1fixed 8.15.1

    A flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash. A successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privil

  • CVE-2024-43709Jan 21, 2025
    affected < 7.17.21fixed 7.17.21

    An allocation of resources without limits or throttling in Elasticsearch can lead to an OutOfMemoryError exception resulting in a crash via a specially crafted query using an SQL function.

  • CVE-2024-12539Dec 17, 2024
    affected >= 8.16.0, < 8.16.2fixed 8.16.2

    An issue was discovered where improper authorization controls affected certain queries that could allow a malicious actor to circumvent Document Level Security in Elasticsearch and get access to documents that their roles would normally not allow.

  • CVE-2024-23444Jul 31, 2024
    affected >= 8.0.0-alpha1, < 8.13.0fixed 8.13.0

    It was discovered by Elastic engineering that when elasticsearch-certutil CLI tool is used with the csr option in order to create a new Certificate Signing Requests, the associated private key that is generated is stored on disk unencrypted even if the --pass parameter is passed

  • CVE-2023-49921Jul 26, 2024
    affected < 7.17.16fixed 7.17.16

    An issue was discovered by Elastic whereby Watcher search input logged the search query results on DEBUG log level. This could lead to raw contents of documents stored in Elasticsearch to be printed in logs. Elastic has released 8.11.2 and 7.17.16 that resolves this issue by remo

  • CVE-2024-37280Jun 13, 2024
    affected >= 8.13.1, < 8.14.0fixed 8.14.0

    A flaw was discovered in Elasticsearch, affecting document ingestion when an index template contains a dynamic field mapping of “passthrough” type. Under certain circumstances, ingesting documents in this index would cause a StackOverflow exception to be thrown and ultimately lea

  • CVE-2024-23449Mar 29, 2024
    affected >= 8.4.0, < 8.11.1fixed 8.11.1

    An uncaught exception in Elasticsearch >= 8.4.0 and < 8.11.1 occurs when an encrypted PDF is passed to an attachment processor through the REST API. The Elasticsearch ingest node that attempts to parse the PDF file will crash. This does not happen with password-protected PDF file

  • CVE-2024-23451Mar 27, 2024
    affected >= 8.10.0, < 8.13.0fixed 8.13.0

    Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a malicious user with a valid API key for a remote cluster configured to use the new Remote Clu

  • CVE-2024-23450Mar 27, 2024
    affected >= 7.0.0, < 7.17.19fixed 7.17.19

    A flaw was discovered in Elasticsearch, where processing a document in a deeply nested pipeline on an ingest node could cause the Elasticsearch node to crash.

  • CVE-2023-46673Nov 22, 2023
    affected >= 7.0.0, < 7.17.14fixed 7.17.14

    It was identified that malformed scripts used in the script processor of an Ingest Pipeline could cause an Elasticsearch node to crash when calling the Simulate Pipeline API.

  • CVE-2023-31417Oct 26, 2023
    affected >= 7.0.0, < 7.17.13fixed 7.17.13

    Elasticsearch generally filters out sensitive information and credentials before logging to the audit log. It was found that this filtering was not applied when requests to Elasticsearch use certain deprecated URIs for APIs. The impact of this flaw is that sensitive information s

  • CVE-2023-31418Oct 26, 2023
    affected < 7.17.13fixed 7.17.13

    An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The issue was identified by Elasti

  • CVE-2023-31419Oct 26, 2023
    affected >= 7.0.0, < 7.17.13fixed 7.17.13

    A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.

  • CVE-2022-23712Jun 6, 2022
    affected >= 8.0.0, < 8.2.1fixed 8.2.1

    A Denial of Service flaw was discovered in Elasticsearch. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request.

  • CVE-2022-23710Mar 3, 2022
    affected >= 7.16.0, < 7.17.1fixed 7.17.1

    A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victim’s browser.

  • CVE-2022-23708Mar 3, 2022
    affected >= 7.16.0, < 7.17.1fixed 7.17.1

    A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index.

Page 1 of 3