elasticsearch CVE Vulnerabilities & Metrics

Focus on elasticsearch vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About elasticsearch Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with elasticsearch. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total elasticsearch CVEs: 11
Earliest CVE date: 28 Jul 2014, 19:55 UTC
Latest CVE date: 08 Dec 2017, 18:29 UTC

Latest CVE reference: CVE-2017-11480

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical elasticsearch CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.96

Max CVSS: 7.2

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 12
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS elasticsearch CVEs

These are the five CVEs with the highest CVSS scores for elasticsearch, sorted by severity first and recency.

All CVEs for elasticsearch

CVE-2017-11480 elasticsearch vulnerability CVSS: 5.0 08 Dec 2017, 18:29 UTC

Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.

CVE-2017-8444 elasticsearch vulnerability CVSS: 4.3 29 Sep 2017, 01:34 UTC

The client-forwarder in Elastic Cloud Enterprise versions prior to 1.0.2 do not properly encrypt traffic to ZooKeeper. If an attacker is able to man in the middle (MITM) the traffic between the client-forwarder and ZooKeeper they could potentially obtain sensitive data.

CVE-2017-11479 elasticsearch vulnerability CVSS: 4.3 29 Sep 2017, 01:34 UTC

Kibana versions prior to 5.6.1 had a cross-site scripting (XSS) vulnerability in Timelion that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.

CVE-2017-14730 elasticsearch vulnerability CVSS: 7.2 25 Sep 2017, 17:29 UTC

The init script in the Gentoo app-admin/logstash-bin package before 5.5.3 and 5.6.x before 5.6.1 has "chown -R" calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to a $LS_USER account for creation of a hard link.

CVE-2017-8446 elasticsearch vulnerability CVSS: 4.0 18 Aug 2017, 20:29 UTC

The Reporting feature in X-Pack in versions prior to 5.5.2 and standalone Reporting plugin versions versions prior to 2.4.6 had an impersonation vulnerability. A user with the reporting_user role could execute a report with the permissions of another reporting user, possibly gaining access to sensitive data.

CVE-2015-5619 elasticsearch vulnerability CVSS: 4.3 09 Aug 2017, 16:29 UTC

Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack.

CVE-2015-4165 elasticsearch vulnerability CVSS: 6.0 09 Aug 2017, 16:29 UTC

The snapshot API in Elasticsearch before 1.6.0 when another application exists on the system that can read Lucene files and execute code from them, is accessible by the attacker, and the Java VM on which Elasticsearch is running can write to a location that the other application can read and execute from, allows remote authenticated users to write to and create arbitrary snapshot metadata files, and potentially execute arbitrary code.

CVE-2015-5378 elasticsearch vulnerability CVSS: 5.0 27 Jun 2017, 20:29 UTC

Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server.

CVE-2016-10362 elasticsearch vulnerability CVSS: 4.0 16 Jun 2017, 21:29 UTC

Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffing, would log to file HTTP basic auth credentials.

CVE-2015-5531 elasticsearch vulnerability CVSS: 5.0 17 Aug 2015, 15:59 UTC

Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.

CVE-2015-3337 elasticsearch vulnerability CVSS: 4.3 01 May 2015, 15:59 UTC

Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.

CVE-2014-6439 elasticsearch vulnerability CVSS: 4.3 10 Oct 2014, 01:55 UTC

Cross-site scripting (XSS) vulnerability in the CORS functionality in Elasticsearch before 1.4.0.Beta1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-3120 elasticsearch vulnerability CVSS: 6.8 28 Jul 2014, 19:55 UTC

The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.