Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6023

Опубликовано: 22 июл. 2025
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XSS. Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01

A Cross-site scripting (XSS) vulnerability was found in Grafana caused by client path traversal and open redirect. This flaw allows attackers to redirect users to malicious websites that execute arbitrary JavaScript code in scripted dashboards. Unlike many other XSS vulnerabilities, this vulnerability does not require editor permissions. If anonymous access is enabled, the XSS attack will be successful.

Отчет

No Red Hat products or offerings are affected by this vulnerability. As the version of grafana (9.2.10/10.2.6) shipped in this version of Red Hat Enterprise Linux is not vulnerable to this CVE. The vulnerable versions listed in the CVE posting are 12.0.x, 11.6.x, 11.5.x, 11.4.x, and 11.3.x, which are all not in Red Hat Enterprise Linux. This vulnerability is Important because it combines two high-impact vectors—open redirect and stored/reflected XSS—without the common mitigation of requiring elevated permissions. The lack of an editor-role requirement drastically expands the attack surface, enabling exploitation by any unauthenticated attacker if anonymous access is enabled. In Grafana deployments that allow public or wide internal access, an attacker could craft a malicious link that both redirects users to attacker-controlled domains and executes arbitrary JavaScript in scripted dashboards. This can directly lead to session hijacking, credential theft, or full account compromise, potentially allowing an attacker to modify dashboards, extract sensitive data from Grafana data sources, or pivot into connected systems.

Меры по смягчению последствий

Alternatively, you can block this attack by adding the default Content Security Policy configuration as suggested in the Grafana Documentation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10grafanaNot affected
Red Hat Enterprise Linux 8grafanaNot affected
Red Hat Enterprise Linux 9grafanaNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=2381568grafana: Cross Site Scripting in Grafana

EPSS

Процентиль: 81%
0.01535
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.6
ubuntu
2 месяца назад

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XSS. Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01

CVSS3: 7.6
nvd
2 месяца назад

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XSS. Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01

CVSS3: 7.6
debian
2 месяца назад

An open redirect vulnerability has been identified in Grafana OSS that ...

CVSS3: 7.6
github
2 месяца назад

Grafana is vulnerable to XSS attacks through open redirects and path traversal

CVSS3: 7.6
fstec
3 месяца назад

Уязвимость платформы для мониторинга и наблюдения Grafana, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)

EPSS

Процентиль: 81%
0.01535
Низкий

7.1 High

CVSS3