{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T03:13:12.134","vulnerabilities":[{"cve":{"id":"CVE-2026-0543","sourceIdentifier":"security@elastic.co","published":"2026-01-13T21:15:51.170","lastModified":"2026-01-22T20:04:20.370","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed."},{"lang":"es","value":"La Validación de Entrada Incorrecta (CWE-20) en el Conector de Correo Electrónico de Kibana puede permitir a un atacante causar una Asignación Excesiva (CAPEC-130) a través de un parámetro de dirección de correo electrónico especialmente diseñado. Esto requiere que un atacante tenga acceso autenticado con privilegios de nivel de vista suficientes para ejecutar acciones del conector. La aplicación intenta procesar un formato de correo electrónico especialmente diseñado, lo que resulta en una indisponibilidad completa del servicio para todos los usuarios hasta que se realice un reinicio manual."}],"metrics":{"cvssMetricV31":[{"source":"security@elastic.co","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@elastic.co","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndIncluding":"7.17.29","matchCriteriaId":"8820B4BC-0DAB-4C9B-8053-90DE2C19646E"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.19.0","matchCriteriaId":"5D2BD2D1-17FA-4143-9F5F-ACDA3DA08954"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.1.10","matchCriteriaId":"FC3281ED-A331-43DC-9705-80A3FA3E6C75"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.2.0","versionEndExcluding":"9.2.4","matchCriteriaId":"8BF9D6AE-B07F-4516-A684-60B02BF731A0"}]}]}],"references":[{"url":"https://discuss.elastic.co/t/kibana-8-19-10-9-1-10-9-2-4-security-update-esa-2026-08/384523","source":"security@elastic.co","tags":["Vendor Advisory"]}]}}]}