Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-13653

CVE-2025-13653: Search Guard FLX Auth Bypass Flaw

CVE-2025-13653 is an authentication bypass vulnerability in Search Guard FLX versions 3.1.0 to 4.0.0 that allows authenticated users to access data streams without proper privileges. This article covers technical details, affected versions, impact, and mitigation strategies.

Updated: January 22, 2026

CVE-2025-13653 Overview

CVE-2025-13653 is a medium-severity information disclosure vulnerability affecting Search Guard FLX, a security plugin for Elasticsearch. In Search Guard FLX versions from 3.1.0 up to 4.0.0 with enterprise modules being disabled, an issue exists which allows authenticated users to use specially crafted requests to read documents from data streams without having the respective privileges.

This vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), indicating that the core issue stems from improper access control allowing unauthorized data access through crafted requests.

Critical Impact

Authenticated users can bypass privilege restrictions to read sensitive documents from data streams, potentially exposing confidential information stored in Elasticsearch clusters protected by Search Guard FLX.

Affected Products

  • Search Guard FLX versions 3.1.0 to 4.0.0 (with enterprise modules disabled)

Discovery Timeline

  • 2025-12-01 - CVE-2025-13653 published to NVD
  • 2025-12-02 - Last updated in NVD database

Technical Details for CVE-2025-13653

Vulnerability Analysis

This vulnerability carries a CVSS v3.1 base score of 4.3 (Medium severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N.

MetricValue
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
Confidentiality ImpactLow
Integrity ImpactNone
Availability ImpactNone

The EPSS (Exploit Prediction Scoring System) data indicates:

  • EPSS Score: 0.026%
  • EPSS Percentile: 6.598

This relatively low EPSS score suggests limited probability of exploitation in the wild, though the vulnerability remains a concern for environments running affected versions.

Root Cause

The vulnerability stems from an authorization bypass issue in Search Guard FLX's access control mechanism when enterprise modules are disabled. The security plugin fails to properly validate user privileges when processing requests targeting data streams, allowing authenticated users to circumvent intended access restrictions.

When enterprise modules are disabled, the reduced security controls create a gap in privilege enforcement specifically for data stream access. This represents a broken access control condition where the application does not adequately verify that a user has the necessary permissions before granting access to sensitive data stream documents.

Attack Vector

The attack vector is network-based, requiring low attack complexity. An authenticated attacker can exploit this vulnerability by crafting specialized requests targeting data streams within the Elasticsearch cluster. The attack does not require user interaction and can be performed remotely over the network.

The exploitation path involves:

  1. An attacker authenticates to the Elasticsearch cluster using valid (potentially low-privileged) credentials
  2. The attacker identifies data streams containing sensitive information they should not have access to
  3. The attacker crafts specialized requests designed to bypass privilege checks
  4. Due to the vulnerability in Search Guard FLX's access control, the requests succeed despite insufficient privileges
  5. The attacker receives document contents from the targeted data streams

Since no verified exploit code is available, the specific request structure required to exploit this vulnerability is not publicly documented. Security teams should refer to the Search Guard advisory for technical details.

Detection Methods for CVE-2025-13653

Indicators of Compromise

  • Unusual data stream access patterns from users who should not have privileges to specific data streams
  • Audit logs showing successful reads of data stream documents by users lacking explicit read permissions
  • Anomalous query patterns targeting multiple data streams across the cluster

Detection Strategies

Organizations can implement the following detection strategies:

  1. Audit Log Analysis: Enable comprehensive audit logging in Search Guard FLX and monitor for data stream access by users who lack explicit privileges to those streams.

  2. Access Pattern Monitoring: Establish baseline access patterns for users and alert on deviations, particularly when users access data streams outside their normal scope.

  3. Version Verification: Verify the Search Guard FLX version in use. Systems running versions 3.1.0 through 4.0.0 with enterprise modules disabled are potentially vulnerable.

  4. Configuration Review: Check whether enterprise modules are enabled or disabled, as the vulnerability specifically affects configurations with enterprise modules disabled.

Monitoring Recommendations

  • Implement real-time monitoring of Elasticsearch audit logs for unauthorized data stream access attempts
  • Configure alerts for any successful data stream document retrievals by users without explicit permissions
  • Deploy network traffic analysis to identify anomalous patterns of Elasticsearch queries
  • Establish regular reviews of user privilege assignments versus actual access patterns

How to Mitigate CVE-2025-13653

Immediate Actions Required

  • Upgrade Search Guard FLX to version 4.0.1 or later immediately
  • Enable enterprise modules if possible, as the vulnerability specifically affects configurations with enterprise modules disabled
  • Review and restrict user authentication to minimize the pool of potential attackers
  • Audit data stream access logs to identify any potential past exploitation

Patch Information

Search Guard has released version 4.0.1 which addresses this vulnerability. The fix is documented in the Search Guard FLX 4.0.1 Changelog.

Organizations should prioritize upgrading to the patched version. Additional information about this CVE and related security advisories can be found at the Search Guard CVE Advisory page.

Workarounds

If immediate patching is not possible, organizations should consider the following temporary mitigations:

  1. Enable Enterprise Modules: If licensing permits, enabling enterprise modules may provide additional security controls that mitigate this vulnerability.

  2. Restrict Authentication: Limit authenticated access to only essential users and services, reducing the potential attack surface.

  3. Network Segmentation: Isolate Elasticsearch clusters to reduce network-based attack vectors.

  4. Enhanced Monitoring: Implement strict monitoring of data stream access patterns until the patch can be applied.

bash
# Verify current Search Guard FLX version
curl -XGET "https://localhost:9200/_searchguard/health" -k

# Check if enterprise modules are enabled
curl -XGET "https://localhost:9200/_searchguard/license" -k

# Review audit logging configuration to ensure data stream access is logged
# Ensure sgconfig/sg_audit.yml has appropriate settings enabled

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechSearch Guard

  • SeverityMEDIUM

  • CVSS Score4.3

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-200
  • Technical References
  • Docs Search-guard

  • Search-guard
  • Related CVEs
  • CVE-2026-4818: Search Guard FLX Privilege Escalation Flaw

  • CVE-2026-4819: Search Guard FLX Credential Disclosure Flaw

  • CVE-2026-4799: Search Guard FLX CSRF Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English