Количество 394
Количество 394
GHSA-7533-c8qv-jm9m
Grafana directory traversal for .cvs files
GHSA-6wh2-8hw7-jw94
Grafana XSS via adding a link in General feature
GHSA-69j6-29vr-p3j9
Authentication bypass for viewing and deletions of snapshots
GHSA-6858-383c-7xhr
Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.
GHSA-66c4-2g2v-54qw
Grafana org admin can delete pending invites in different org
GHSA-6676-9pqr-4cw3
Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.
GHSA-5mxf-42f5-j782
Grafana's users with permissions to create a data source can CRUD all data sources
GHSA-57qv-hxpw-pjp9
The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode
GHSA-4pwp-cx67-5cpx
Grafana Arbitrary File Read
GHSA-4pff-25fv-cm83
Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
GHSA-4724-7jwc-3fpw
Grafana Spoofing originalUrl of snapshots
GHSA-46x4-c48q-4248
Grafana version < 6.7.3 is vulnerable for annotation popup XSS.
GHSA-3p62-42x7-gxg5
Grafana User enumeration via forget password
GHSA-3j9m-hcv9-rpj8
XSS vulnerability allowing arbitrary JavaScript execution
GHSA-3hv4-r2fm-h27f
Email Validation Bypass And Preventing Sign Up From Email's Owner
GHSA-2x6g-h2hg-rq84
Grafana Email addresses and usernames can not be trusted
CVE-2025-4123
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
CVE-2025-4123
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
CVE-2025-4123
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
CVE-2025-4123
A cross-site scripting (XSS) vulnerability exists in Grafana caused by ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-7533-c8qv-jm9m Grafana directory traversal for .cvs files | CVSS3: 4.3 | 1% Низкий | больше 1 года назад | |
GHSA-6wh2-8hw7-jw94 Grafana XSS via adding a link in General feature | CVSS3: 6.1 | 1% Низкий | почти 2 года назад | |
GHSA-69j6-29vr-p3j9 Authentication bypass for viewing and deletions of snapshots | CVSS3: 7.3 | 94% Критический | около 4 лет назад | |
GHSA-6858-383c-7xhr Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access. | CVSS3: 7.1 | 0% Низкий | больше 3 лет назад | |
GHSA-66c4-2g2v-54qw Grafana org admin can delete pending invites in different org | CVSS3: 2.2 | 0% Низкий | около 1 года назад | |
GHSA-6676-9pqr-4cw3 Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address. | CVSS3: 6.6 | 0% Низкий | около 2 лет назад | |
GHSA-5mxf-42f5-j782 Grafana's users with permissions to create a data source can CRUD all data sources | CVSS3: 6 | 0% Низкий | почти 2 года назад | |
GHSA-57qv-hxpw-pjp9 The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
GHSA-4pwp-cx67-5cpx Grafana Arbitrary File Read | CVSS3: 6.5 | 37% Средний | почти 2 года назад | |
GHSA-4pff-25fv-cm83 Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator | CVSS3: 5 | 0% Низкий | почти 2 года назад | |
GHSA-4724-7jwc-3fpw Grafana Spoofing originalUrl of snapshots | CVSS3: 6.7 | 0% Низкий | больше 1 года назад | |
GHSA-46x4-c48q-4248 Grafana version < 6.7.3 is vulnerable for annotation popup XSS. | 1% Низкий | больше 3 лет назад | ||
GHSA-3p62-42x7-gxg5 Grafana User enumeration via forget password | CVSS3: 6.7 | 0% Низкий | больше 1 года назад | |
GHSA-3j9m-hcv9-rpj8 XSS vulnerability allowing arbitrary JavaScript execution | CVSS3: 6.9 | 79% Высокий | около 4 лет назад | |
GHSA-3hv4-r2fm-h27f Email Validation Bypass And Preventing Sign Up From Email's Owner | CVSS3: 5.4 | 0% Низкий | почти 2 года назад | |
GHSA-2x6g-h2hg-rq84 Grafana Email addresses and usernames can not be trusted | CVSS3: 6.4 | 0% Низкий | больше 1 года назад | |
CVE-2025-4123 A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive. | CVSS3: 7.6 | 5% Низкий | 7 месяцев назад | |
CVE-2025-4123 A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive. | CVSS3: 7.6 | 5% Низкий | 7 месяцев назад | |
CVE-2025-4123 A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive. | CVSS3: 7.6 | 5% Низкий | 7 месяцев назад | |
CVE-2025-4123 A cross-site scripting (XSS) vulnerability exists in Grafana caused by ... | CVSS3: 7.6 | 5% Низкий | 7 месяцев назад |
Уязвимостей на страницу