Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-25012

CVE-2025-25012: How Kibana’s Redirect Weakness Enables Malicious URL Tricks

Vulnerability Overview 

CVE ID: CVE-2025-25012 

CVE Title: Kibana Open Redirect Vulnerability 

Severity: Medium 

Exploit Status: Publicly disclosed (no PoC details provided)

Summary

A medium-severity open redirect in Kibana, CVE-2025-25012, can send users to malicious sites, enabling phishing or SSRF. Versions 7.0.0, 8.0.0, 8.18.0, and 9.0.0 are affected. Fixes include updating to patched versions or, temporarily, enforcing URL validation for trusted destinations only.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-25012?

Technical Overview

How Does the CVE-2025-25012 Exploit Work?

The attack typically follows these steps:

CVE-2025-25012 Exploitation Process

What Causes CVE-2025-25012?

Vulnerability Root Cause:

The issue happens because Kibana doesn’t properly check the destinations used in Short URLs in areas like Discover, Dashboard, and the Visualization Library. Weak URL checks can let attackers trigger SSRF and create links that send users to harmful sites.

How Can You Mitigate CVE-2025-25012?

If immediate patching is delayed or not possible:  

  • Administrators of self-hosted environments using a Basic license should limit access to Kibana features that allow generating Short URLs.
  • Restrict access to Dashboard → All
  • Restrict access to Discover → All

Which Assets and Systems Are at Risk?

Asset Types Affected:

Remediation & Response

Remediation Timeline:

CVSS Breakdown Table

MetricValue Description
Base Score5.4Medium-severity issue
Attack VectorNetworkThe vulnerability can be exploited remotely over a network
Attack ComplexityLowThe attack does not require special conditions or advanced setup
Privileges RequiredLowThe attacker needs low-level permissions to trigger the vulnerability
User Interaction RequiredSuccessful exploitation depends on user involvement
Scope Changed Exploitation may impact components beyond the initially affected one
Confidentiality Impact LowLimited exposure of information is possible
Integrity ImpactLowOnly minor unauthorized data changes are possible
Availability ImpactNoneThe vulnerability does not affect system availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.