A server side request forgery vulnerability was identified in Kibana where the /api/fleet/health_check API could be used to send requests to internal endpoints. Due to the nature of the underlying request, only endpoints available over https that return JSON could be accessed. This can be carried out by users with read access to Fleet.
                
            References
                    | Link | Resource | 
|---|---|
| https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521 | Patch Issue Tracking Vendor Advisory | 
Configurations
                    History
                    30 Sep 2025, 20:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521 - Patch, Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:* | |
| Summary | 
 | |
| First Time | Elastic kibana Elastic | 
23 Jan 2025, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-01-23 06:15
Updated : 2025-09-30 20:58
NVD link : CVE-2024-43710
Mitre link : CVE-2024-43710
CVE.ORG link : CVE-2024-43710
JSON object : View
Products Affected
                elastic
- kibana
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
