{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T23:45:18.334","vulnerabilities":[{"cve":{"id":"CVE-2024-43710","sourceIdentifier":"security@elastic.co","published":"2025-01-23T06:15:27.550","lastModified":"2025-09-30T20:58:49.520","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet."},{"lang":"es","value":"Se identificó una vulnerabilidad de server side request forgery en Kibana, donde la API /api/fleet/health_check se podía usar para enviar solicitudes a endpoints internos. Debido a la naturaleza de la solicitud subyacente, solo se podía acceder a losendpoints disponibles a través de https que devolvieran JSON. Esto lo pueden hacer los usuarios con acceso de lectura a Fleet."}],"metrics":{"cvssMetricV31":[{"source":"security@elastic.co","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security@elastic.co","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","versionStartIncluding":"8.7.0","versionEndExcluding":"8.15.0","matchCriteriaId":"22FF4C9E-C60B-42AB-B0DF-F95DAFEAB92D"}]}]}],"references":[{"url":"https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521","source":"security@elastic.co","tags":["Issue Tracking","Patch","Vendor Advisory"]}]}}]}