CVE-2015-5531

EXPLOITED NUCLEI LAB

Elasticsearch <1.6.1 - Path Traversal

Title source: llm

Description

Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.

Exploits (5)

exploitdb WORKING POC
by Pedro Andujar · pythonwebappslinux
https://www.exploit-db.com/exploits/38383
nomisec WORKING POC 2 stars
by MoCh3n · poc
https://github.com/MoCh3n/CVE-2015-5531-POC
nomisec WORKING POC
by xpgdgit · remote
https://github.com/xpgdgit/CVE-2015-5531
vulncheck_xdb WORKING POC
remote
https://github.com/r3naissance/eatt
metasploit WORKING POC
by Benjamin Smith · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/elasticsearch_traversal.rb

Nuclei Templates (1)

ElasticSearch <1.6.1 - Local File Inclusion
MEDIUMby princechaddha
FOFA: index_not_found_exception

Scores

EPSS 0.9203
EPSS Percentile 99.7%

Details

VulnCheck KEV 2025-05-27
CWE
CWE-22
Status published
Products (2)
elasticsearch/elasticsearch < 1.6.0
org.elasticsearch/elasticsearch 0 - 1.6.1Maven
Published Aug 17, 2015
Tracked Since Feb 18, 2026