-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from Watcher's search input implementation logging query results at DEBUG level. The advisory specifically implicates search input handling under org.elasticsearch.xpack.watcher.input.search, and the standard Watcher execution pattern uses an 'Executable' class to process inputs. The function responsible for executing the search and handling logging would naturally reside in SearchInput.java's execute method. The high confidence comes from the direct correlation between the described vulnerability (DEBUG logging of search results) and the standard Watcher execution flow pattern.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.elasticsearch:elasticsearch | maven | < 7.17.16 | 7.17.16 |
| org.elasticsearch:elasticsearch | maven | >= 8.0.0, < 8.11.2 | 8.11.2 |
Ongoing coverage of React2Shell