PT-2025-41785 · Elastic · Cloud Enterprise

Published

2025-10-13

·

Updated

2025-10-15

·

CVE-2025-37729

CVSS v3.1
9.1
VectorAV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Elastic Cloud Enterprise versions 2.5.0 through 3.8.1 Elastic Cloud Enterprise version 4.0.0 through 4.0.1
Description An issue exists in Elastic Cloud Enterprise (ECE) related to the improper handling of special elements within its template engine. This flaw allows a malicious actor with Admin access to potentially exfiltrate sensitive information and execute commands by crafting a specific string that leverages Jinjava variable evaluation. Approximately 3.2K services are estimated to be affected worldwide. The vulnerability involves a Jinjava template injection, which can lead to remote code execution (RCE). The vulnerability is triggered through crafted input exploiting the Jinjava templating engine.
Recommendations Upgrade Elastic Cloud Enterprise to version 3.8.2 or later. Upgrade Elastic Cloud Enterprise to version 4.0.2 or later.

Fix

RCE

Weakness Enumeration

Related Identifiers

CVE-2025-37729

Affected Products

Cloud Enterprise