Логотип exploitDog
product: "grafana"
Консоль
Логотип exploitDog

exploitDog

product: "grafana"

Количество 390

Количество 390

github логотип

GHSA-69j6-29vr-p3j9

почти 4 года назад

Authentication bypass for viewing and deletions of snapshots

CVSS3: 7.3
EPSS: Критический
github логотип

GHSA-6858-383c-7xhr

больше 3 лет назад

Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-66c4-2g2v-54qw

11 месяцев назад

Grafana org admin can delete pending invites in different org

CVSS3: 2.2
EPSS: Низкий
github логотип

GHSA-6676-9pqr-4cw3

почти 2 года назад

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-5mxf-42f5-j782

больше 1 года назад

Grafana's users with permissions to create a data source can CRUD all data sources

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-57qv-hxpw-pjp9

больше 3 лет назад

The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4pwp-cx67-5cpx

больше 1 года назад

Grafana Arbitrary File Read

CVSS3: 6.5
EPSS: Средний
github логотип

GHSA-4pff-25fv-cm83

больше 1 года назад

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-4724-7jwc-3fpw

больше 1 года назад

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-46x4-c48q-4248

больше 3 лет назад

Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

EPSS: Низкий
github логотип

GHSA-3p62-42x7-gxg5

больше 1 года назад

Grafana User enumeration via forget password

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-3j9m-hcv9-rpj8

почти 4 года назад

XSS vulnerability allowing arbitrary JavaScript execution

CVSS3: 6.9
EPSS: Высокий
github логотип

GHSA-3hv4-r2fm-h27f

больше 1 года назад

Email Validation Bypass And Preventing Sign Up From Email's Owner

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2x6g-h2hg-rq84

больше 1 года назад

Grafana Email addresses and usernames can not be trusted

CVSS3: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2025-4123

4 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
redhat логотип

CVE-2025-4123

4 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2025-4123

4 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
debian логотип

CVE-2025-4123

4 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by ...

CVSS3: 7.6
EPSS: Низкий
ubuntu логотип

CVE-2024-9264

11 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический
redhat логотип

CVE-2024-9264

11 месяцев назад

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-69j6-29vr-p3j9

Authentication bypass for viewing and deletions of snapshots

CVSS3: 7.3
94%
Критический
почти 4 года назад
github логотип
GHSA-6858-383c-7xhr

Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.

CVSS3: 7.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-66c4-2g2v-54qw

Grafana org admin can delete pending invites in different org

CVSS3: 2.2
0%
Низкий
11 месяцев назад
github логотип
GHSA-6676-9pqr-4cw3

Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.

CVSS3: 6.6
0%
Низкий
почти 2 года назад
github логотип
GHSA-5mxf-42f5-j782

Grafana's users with permissions to create a data source can CRUD all data sources

CVSS3: 6
0%
Низкий
больше 1 года назад
github логотип
GHSA-57qv-hxpw-pjp9

The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-4pwp-cx67-5cpx

Grafana Arbitrary File Read

CVSS3: 6.5
37%
Средний
больше 1 года назад
github логотип
GHSA-4pff-25fv-cm83

Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVSS3: 5
0%
Низкий
больше 1 года назад
github логотип
GHSA-4724-7jwc-3fpw

Grafana Spoofing originalUrl of snapshots

CVSS3: 6.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-46x4-c48q-4248

Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-3p62-42x7-gxg5

Grafana User enumeration via forget password

CVSS3: 6.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-3j9m-hcv9-rpj8

XSS vulnerability allowing arbitrary JavaScript execution

CVSS3: 6.9
71%
Высокий
почти 4 года назад
github логотип
GHSA-3hv4-r2fm-h27f

Email Validation Bypass And Preventing Sign Up From Email's Owner

CVSS3: 5.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-2x6g-h2hg-rq84

Grafana Email addresses and usernames can not be trusted

CVSS3: 6.4
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
4%
Низкий
4 месяца назад
redhat логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
4%
Низкий
4 месяца назад
nvd логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
4%
Низкий
4 месяца назад
debian логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by ...

CVSS3: 7.6
4%
Низкий
4 месяца назад
ubuntu логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
11 месяцев назад
redhat логотип
CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS3: 9.9
92%
Критический
11 месяцев назад

Уязвимостей на страницу