CVE-2026-33466
Logstash vulnerability analysis and mitigation

Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139). The archive extraction utilities used by Logstash do not properly validate file paths within compressed archives. An attacker who can serve a specially crafted archive to Logstash through a compromised or attacker-controlled update endpoint can write arbitrary files to the host filesystem with the privileges of the Logstash process. In certain configurations where automatic pipeline reloading is enabled, this can be escalated to remote code execution.


SourceNVD

Related Logstash vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33466HIGH8.1
  • LogstashLogstash
  • cpe:2.3:a:elastic:logstash
NoYesApr 08, 2026
CVE-2024-34158HIGH7.5
  • cAdvisorcAdvisor
  • udica
NoYesSep 06, 2024
CVE-2024-34156HIGH7.5
  • cAdvisorcAdvisor
  • openshift4::ose-powervs-block-csi-driver-operator-rhel8@sha256:67bcd255af73c1055bed023ee1c12831961765923a7987159a816a1b6bc3746b_amd64
NoYesSep 06, 2024
CVE-2025-37730MEDIUM6.5
  • LogstashLogstash
  • cpe:2.3:a:elastic:logstash
NoYesMay 06, 2025
CVE-2024-45614MEDIUM5.4
  • RubyRuby
  • ruby2.5-rubygem-puma
NoYesSep 19, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management