Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 06:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:elastic:elastic_cloud_enterprise:*:*:*:*:*:*:*:* |
Fri, 07 Nov 2025 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Oct 2025 22:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic elastic Cloud Enterprise |
|
| Vendors & Products |
Elastic
Elastic elastic Cloud Enterprise |
Mon, 13 Oct 2025 23:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper neutralization of special elements used in a template engine in Elastic Cloud Enterprise (ECE) can lead to a malicious actor with Admin access exfiltrating sensitive information and issuing commands via a specially crafted string where Jinjava variables are evaluated. | |
| Title | Elastic Cloud Enterprise (ECE) Improper Neutralization of Special Elements Used in a Template Engine | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2025-11-06T14:43:45.993Z
Reserved: 2025-04-16T03:24:04.510Z
Link: CVE-2025-37729
Updated: 2025-11-06T14:43:43.435Z
Status : Analyzed
Published: 2025-10-13T14:15:34.533
Modified: 2025-12-11T20:59:06.597
Link: CVE-2025-37729
No data.
OpenCVE Enrichment
Updated: 2025-10-21T22:10:47Z