A medium-severity information disclosure vulnerability, CVE-2025-12149, has been discovered in floragunn's Search Guard FLX, a popular security plugin for Elasticsearch. The flaw allows for the bypass of Document-Level Security (DLS), a critical feature for data segregation in multi-tenant environments. An attacker with low privileges can exploit this bug by using the Signals alerting feature to run a search, which fails to properly enforce the DLS rules. This could lead to the exposure of sensitive data to unauthorized users. The vulnerability affects all versions up to and including 3.1.2.
CVE-2025-12149 - Search Guard FLX DLS Bypass VulnerabilityAs of the disclosure on November 14, 2025, there is no public exploit code available, and no known active exploitation. However, the logic is straightforward, and motivated attackers could develop an exploit.
The primary purpose of Document-Level Security is to enforce data boundaries in shared Elasticsearch clusters, ensuring that users can only see the data they are authorized to access. This vulnerability completely undermines that control. In a multi-tenant environment where different customers' data resides in the same index, one malicious or compromised low-privilege user could potentially access another customer's sensitive data. This could lead to significant data breaches, regulatory fines (e.g., under GDPR or HIPAA), and loss of customer trust.
log_source: Elasticsearch and Search Guard audit logs.configuration: Review Signals watch configurations for queries that target a broad range of indices, especially if the user who created the watch has restricted permissions.Upgrade to a patched version of Search Guard FLX once it is released by the vendor.
Mapped D3FEND Techniques:
As a workaround, restrict permissions for creating and triggering Signals watches to only trusted administrators.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats