Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9r7m-2qj2-8f7h

Опубликовано: 15 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 5

Описание

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources. The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources. The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.

EPSS

Процентиль: 6%
0.00024
Низкий

5 Medium

CVSS3

Дефекты

CWE-285

Связанные уязвимости

CVSS3: 5
nvd
5 дней назад

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources. The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.

EPSS

Процентиль: 6%
0.00024
Низкий

5 Medium

CVSS3

Дефекты

CWE-285