Vulnerability Alert: react-search-ui-views 1.20.2 Exposes Kibana Project to Reachable Security Flaws
A critical security scan has flagged the npm package `react-search-ui-views-1.20.2.tgz` for containing two reachable vulnerabilities within a production Kibana project. The highest severity score is 3.7 (CVSS), indicating a low-to-moderate risk that is nonetheless actively exploitable due to the 'reachable' designation. This finding originates from a specific commit (`7404e685ae6cf7f87b0d75635f2e80424cd20d57`) in the `amaybaum-prod/kibana-rnorris-wildemat` GitHub repository, directly linking the vulnerable dependency to a live codebase.
The vulnerability, tracked as CVE-2026-2391, is embedded in the project's `/package.json` file. The 'reachable' status is a key technical detail, meaning the vulnerable code paths can be triggered by an attacker, moving the issue from a theoretical concern to a practical security exposure. While the CVSS score is not critical, the combination of being actively reachable within a Kibana-related project raises immediate code hygiene and supply chain security questions for the maintainers.
This incident highlights the persistent risk of transitive dependencies in modern software development, especially within the Elastic ecosystem. For teams relying on `react-search-ui-views`, the pressure is now on to assess remediation paths, which may involve upgrading to a patched version if available. The public posting on a GitHub issue tracker transforms a routine security scan into a visible accountability event, prompting scrutiny of the project's dependency management practices and potentially affecting downstream users who fork or depend on this repository.