Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2026-26934

Improper Validation of Specified Quantity in Input (CWE-1284) in Kibana can allow an authenticated attacker with view-only privileges to cause a Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted, malformed payload causing excessive resource consumption and resulting in Kibana becoming unresponsive or crashing.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.6%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2026-26934
  • Elastic » Kibana » Version: 8.18.0
    cpe:2.3:a:elastic:kibana:8.18.0
  • Elastic » Kibana » Version: 8.18.1
    cpe:2.3:a:elastic:kibana:8.18.1
  • Elastic » Kibana » Version: 8.18.2
    cpe:2.3:a:elastic:kibana:8.18.2
  • Elastic » Kibana » Version: 8.18.3
    cpe:2.3:a:elastic:kibana:8.18.3
  • Elastic » Kibana » Version: 8.18.4
    cpe:2.3:a:elastic:kibana:8.18.4
  • Elastic » Kibana » Version: 8.18.5
    cpe:2.3:a:elastic:kibana:8.18.5
  • Elastic » Kibana » Version: 8.18.6
    cpe:2.3:a:elastic:kibana:8.18.6
  • Elastic » Kibana » Version: 8.18.7
    cpe:2.3:a:elastic:kibana:8.18.7
  • Elastic » Kibana » Version: 8.18.8
    cpe:2.3:a:elastic:kibana:8.18.8
  • Elastic » Kibana » Version: 8.19.0
    cpe:2.3:a:elastic:kibana:8.19.0
  • Elastic » Kibana » Version: 8.19.1
    cpe:2.3:a:elastic:kibana:8.19.1
  • Elastic » Kibana » Version: 8.19.2
    cpe:2.3:a:elastic:kibana:8.19.2
  • Elastic » Kibana » Version: 8.19.3
    cpe:2.3:a:elastic:kibana:8.19.3
  • Elastic » Kibana » Version: 8.19.4
    cpe:2.3:a:elastic:kibana:8.19.4
  • Elastic » Kibana » Version: 8.19.5
    cpe:2.3:a:elastic:kibana:8.19.5
  • Elastic » Kibana » Version: 8.19.6
    cpe:2.3:a:elastic:kibana:8.19.6
  • Elastic » Kibana » Version: 8.19.7
    cpe:2.3:a:elastic:kibana:8.19.7
  • Elastic » Kibana » Version: 8.19.8
    cpe:2.3:a:elastic:kibana:8.19.8
  • Elastic » Kibana » Version: 8.19.9
    cpe:2.3:a:elastic:kibana:8.19.9
  • Elastic » Kibana » Version: 9.0.0
    cpe:2.3:a:elastic:kibana:9.0.0
  • Elastic » Kibana » Version: 9.0.1
    cpe:2.3:a:elastic:kibana:9.0.1
  • Elastic » Kibana » Version: 9.0.2
    cpe:2.3:a:elastic:kibana:9.0.2
  • Elastic » Kibana » Version: 9.0.3
    cpe:2.3:a:elastic:kibana:9.0.3
  • Elastic » Kibana » Version: 9.0.4
    cpe:2.3:a:elastic:kibana:9.0.4
  • Elastic » Kibana » Version: 9.0.5
    cpe:2.3:a:elastic:kibana:9.0.5
  • Elastic » Kibana » Version: 9.0.6
    cpe:2.3:a:elastic:kibana:9.0.6
  • Elastic » Kibana » Version: 9.0.7
    cpe:2.3:a:elastic:kibana:9.0.7
  • Elastic » Kibana » Version: 9.0.8
    cpe:2.3:a:elastic:kibana:9.0.8
  • Elastic » Kibana » Version: 9.1.0
    cpe:2.3:a:elastic:kibana:9.1.0
  • Elastic » Kibana » Version: 9.1.1
    cpe:2.3:a:elastic:kibana:9.1.1
  • Elastic » Kibana » Version: 9.1.2
    cpe:2.3:a:elastic:kibana:9.1.2
  • Elastic » Kibana » Version: 9.1.3
    cpe:2.3:a:elastic:kibana:9.1.3
  • Elastic » Kibana » Version: 9.1.4
    cpe:2.3:a:elastic:kibana:9.1.4
  • Elastic » Kibana » Version: 9.1.5
    cpe:2.3:a:elastic:kibana:9.1.5
  • Elastic » Kibana » Version: 9.1.6
    cpe:2.3:a:elastic:kibana:9.1.6
  • Elastic » Kibana » Version: 9.1.7
    cpe:2.3:a:elastic:kibana:9.1.7
  • Elastic » Kibana » Version: 9.1.8
    cpe:2.3:a:elastic:kibana:9.1.8
  • Elastic » Kibana » Version: 9.1.9
    cpe:2.3:a:elastic:kibana:9.1.9
  • Elastic » Kibana » Version: 9.2.0
    cpe:2.3:a:elastic:kibana:9.2.0
  • Elastic » Kibana » Version: 9.2.1
    cpe:2.3:a:elastic:kibana:9.2.1
  • Elastic » Kibana » Version: 9.2.2
    cpe:2.3:a:elastic:kibana:9.2.2
  • Elastic » Kibana » Version: 9.2.3
    cpe:2.3:a:elastic:kibana:9.2.3
  • Elastic » Kibana » Version: 9.3.0
    cpe:2.3:a:elastic:kibana:9.3.0


Contact Us

Shodan ® - All rights reserved