Path Traversal Vulnerability in Logstash Affects Elastic.co Products
CVE-2026-33466

8.1HIGH

Key Information:

Vendor

Elastic

Status
Vendor
CVE Published:
8 April 2026

What is CVE-2026-33466?

A vulnerability in Logstash arises from improper validation of file paths within compressed archives. This weakness allows attackers to exploit the system by serving manipulated archive files through a compromised update endpoint. As a result, arbitrary files can be written to the filesystem with Logstash's privileges. In specific configurations with automatic pipeline reloading enabled, this vulnerability poses a significant risk of escalating to remote code execution, making it critical for users to apply security updates promptly.

Affected Version(s)

Logstash 8.0.0 <= 8.19.13

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.