{"id":"CVE-2025-37732","details":"Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to render HTML tags within a user’s browser via the integration package upload functionality. This issue is related to ESA-2025-17 (CVE-2025-25018) bypassing that fix to achieve HTML injection.","aliases":["BIT-elk-2025-37732","BIT-kibana-2025-37732"],"modified":"2026-04-10T05:25:50.121801Z","published":"2025-12-15T11:15:39.860Z","related":["CGA-824r-84xj-493q"],"references":[{"type":"ADVISORY","url":"https://discuss.elastic.co/t/kibana-8-19-8-9-1-8-and-9-2-2-security-update-esa-2025-28/384064"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/elastic/kibana","events":[{"introduced":"ee89fda8a17eff9c93f7400c102edf76cb4d7d8a"},{"last_affected":"f6e2f2e44cc0a6a11435f1b6350f735e23bef4b4"},{"introduced":"57ca5e139a33dd2eed927ce98d8231a1f217cd15"},{"fixed":"5f55be16d833f6df054715d37659874bcecaa0b1"},{"introduced":"504d6bfa94cca17fabb76e06152c30c4f0c3efdd"},{"fixed":"6ecd757760927423daa344d901e634b43497e16d"},{"introduced":"68626ce831ffb8e4138bb24ba8762a15a569a41c"},{"fixed":"c0340ed35c591c77a90ebf1c790c20aa07571672"}],"database_specific":{"versions":[{"introduced":"7.0.0"},{"last_affected":"7.17.29"},{"introduced":"8.0.0"},{"fixed":"8.19.8"},{"introduced":"9.0.0"},{"fixed":"9.1.8"},{"introduced":"9.2.0"},{"fixed":"9.2.2"}]}}],"versions":["v9.2.0","v9.2.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37732.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}