here. This is a new vulnerability which is not yet documented.For the moment, we have following recommendations specific to ES which should be reviewed and implemented as soon as possible:
1. Upgrade ES to the latest version2. Never run ES as root user.3. Never allow ES to be publicly accessible. 4. If you're running an older version, you want to add this to your config/elasticsearch.yaml:script.disable_dynamic: trueFor more information, please check ElasticSearch documentation links 1 and 2.Update: For E2E managed clients with known ES installation, we are proactively reaching out with security advice. If you are an unmanaged client running ES on your server, please send an email to support@e2enetworks.com and we will help you with the recommendations.Root Compromise Vulnerability in instances running ElasticSearch
April 30, 2025
Table of Contents
Latest Blogs