{"id":"CVE-2026-0543","details":"Improper Input Validation (CWE-20) in Kibana's Email Connector can allow an attacker to cause an Excessive Allocation (CAPEC-130) through a specially crafted email address parameter. This requires an attacker to have authenticated access with view-level privileges sufficient to execute connector actions. The application attempts to process specially crafted email format, resulting in complete service unavailability for all users until manual restart is performed.","aliases":["BIT-elk-2026-0543","BIT-kibana-2026-0543"],"modified":"2026-04-10T05:36:51.665022Z","published":"2026-01-13T21:15:51.170Z","related":["CGA-7gvg-fvqv-crh3"],"references":[{"type":"ADVISORY","url":"https://discuss.elastic.co/t/kibana-8-19-10-9-1-10-9-2-4-security-update-esa-2026-08/384523"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/elastic/kibana","events":[{"introduced":"ee89fda8a17eff9c93f7400c102edf76cb4d7d8a"},{"last_affected":"f6e2f2e44cc0a6a11435f1b6350f735e23bef4b4"},{"introduced":"57ca5e139a33dd2eed927ce98d8231a1f217cd15"},{"fixed":"ffd7cbf34ac1234c78354f2a22ef5f1703c04eaf"},{"introduced":"504d6bfa94cca17fabb76e06152c30c4f0c3efdd"},{"fixed":"3c5e7066866006c39ba40861ab0c05b6406ed357"},{"introduced":"68626ce831ffb8e4138bb24ba8762a15a569a41c"},{"fixed":"b05a85503d4590280c7e9263175269a5f4a09729"}],"database_specific":{"versions":[{"introduced":"7.0.0"},{"last_affected":"7.17.29"},{"introduced":"8.0.0"},{"fixed":"8.19.0"},{"introduced":"9.0.0"},{"fixed":"9.1.10"},{"introduced":"9.2.0"},{"fixed":"9.2.4"}]}}],"versions":["v9.2.0","v9.2.1","v9.2.2","v9.2.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0543.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}