{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-37736","assignerOrgId":"271b6943-45a9-4f3a-ab4e-976f3fa05b5a","state":"PUBLISHED","assignerShortName":"elastic","dateReserved":"2025-04-16T03:24:04.511Z","datePublished":"2025-11-07T22:08:11.891Z","dateUpdated":"2026-02-26T17:47:06.540Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Elastic Cloud Enterprise (ECE)","vendor":"Elastic","versions":[{"lessThanOrEqual":"3.8.2","status":"affected","version":"3.8.0","versionType":"semver"},{"lessThanOrEqual":"4.0.2","status":"affected","version":"4.0.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is:</p><div></div><p></p><p>post:/platform/configuration/security/service-accounts<br>delete:/platform/configuration/security/service-accounts/{user_id}<br>patch:/platform/configuration/security/service-accounts/{user_id}<br>post:/platform/configuration/security/service-accounts/{user_id}/keys<br>delete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id}<br>patch:/user<br>post:/users<br>post:/users/auth/keys<br>delete:/users/auth/keys<br>delete:/users/auth/keys/_all<br>delete:/users/auth/keys/{api_key_id}<br>delete:/users/{user_id}/auth/keys<br>delete:/users/{user_id}/auth/keys/{api_key_id}<br>delete:/users/{user_name}<br>patch:/users/{user_name} <br></p><br>"}],"value":"Improper Authorization in Elastic Cloud Enterprise can lead to Privilege Escalation where the built-in readonly user can call APIs that should not be allowed. The list of APIs that are affected by this issue is:\n\n\n\n\n\npost:/platform/configuration/security/service-accounts\ndelete:/platform/configuration/security/service-accounts/{user_id}\npatch:/platform/configuration/security/service-accounts/{user_id}\npost:/platform/configuration/security/service-accounts/{user_id}/keys\ndelete:/platform/configuration/security/service-accounts/{user_id}/keys/{api_key_id}\npatch:/user\npost:/users\npost:/users/auth/keys\ndelete:/users/auth/keys\ndelete:/users/auth/keys/_all\ndelete:/users/auth/keys/{api_key_id}\ndelete:/users/{user_id}/auth/keys\ndelete:/users/{user_id}/auth/keys/{api_key_id}\ndelete:/users/{user_name}\npatch:/users/{user_name}"}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-863","description":"CWE-863 Incorrect Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"271b6943-45a9-4f3a-ab4e-976f3fa05b5a","shortName":"elastic","dateUpdated":"2025-11-07T22:17:25.666Z"},"references":[{"url":"https://discuss.elastic.co/t/elastic-cloud-enterprise-ece-3-8-3-and-4-0-3-security-update-esa-2025-22/383132"}],"source":{"discovery":"UNKNOWN"},"title":"Elastic Cloud Enterprise Improper Authorization","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-37736","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-11-11T04:55:36.114423Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:47:06.540Z"}}]}}