{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T07:17:36.766","vulnerabilities":[{"cve":{"id":"CVE-2026-26934","sourceIdentifier":"security@elastic.co","published":"2026-02-26T18:23:07.647","lastModified":"2026-03-02T15:59:55.850","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Validation of Specified Quantity in Input (CWE-1284) in Kibana can allow an authenticated attacker with view-only privileges to cause a Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted, malformed payload causing excessive resource consumption and resulting in Kibana becoming unresponsive or crashing."},{"lang":"es","value":"La Validación Incorrecta de la Cantidad Especificada en la Entrada (CWE-1284) en Kibana puede permitir a un atacante autenticado con privilegios de solo lectura causar una denegación de servicio mediante Manipulación de Datos de Entrada (CAPEC-153). Un atacante puede enviar una carga útil malformada y especialmente diseñada, causando un consumo excesivo de recursos y provocando que Kibana deje de responder o se bloquee."}],"metrics":{"cvssMetricV31":[{"source":"security@elastic.co","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@elastic.co","type":"Secondary","description":[{"lang":"en","value":"CWE-1284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","versionStartIncluding":"8.18.0","versionEndExcluding":"8.19.12","matchCriteriaId":"D88B8A69-2A25-4EB1-AAE4-C18A9F954D03"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.2.6","matchCriteriaId":"F14ACA8C-46A2-42EF-9F63-AEF657C6736A"},{"vulnerable":true,"criteria":"cpe:2.3:a:elastic:kibana:9.3.0:*:*:*:*:*:*:*","matchCriteriaId":"6E90DE12-A5EC-4C3C-A86E-BF5AA0778628"}]}]}],"references":[{"url":"https://discuss.elastic.co/t/kibana-8-19-12-9-2-6-9-3-1-security-update-esa-2026-12/385248","source":"security@elastic.co","tags":["Vendor Advisory"]}]}}]}