Логотип exploitDog
bind:"BDU:2025-06809" OR bind:"CVE-2025-4123"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-06809" OR bind:"CVE-2025-4123"

Количество 10

Количество 10

fstec логотип

BDU:2025-06809

3 месяца назад

Уязвимость компонента Custom Frontend Plugin платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)

CVSS3: 7.6
EPSS: Низкий
redos логотип

ROS-20250619-15

около 2 месяцев назад

Множественные уязвимости grafana

CVSS3: 8.3
EPSS: Низкий
ubuntu логотип

CVE-2025-4123

2 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
redhat логотип

CVE-2025-4123

3 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2025-4123

2 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
EPSS: Низкий
debian логотип

CVE-2025-4123

2 месяца назад

A cross-site scripting (XSS) vulnerability exists in Grafana caused by ...

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-q53q-gxq9-mgrj

2 месяца назад

Grafana Cross-Site-Scripting (XSS) via custom loaded frontend plugin

CVSS3: 7.6
EPSS: Низкий
oracle-oval логотип

ELSA-2025-7894

3 месяца назад

ELSA-2025-7894: grafana security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7893

2 месяца назад

ELSA-2025-7893: grafana security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7892

около 1 месяца назад

ELSA-2025-7892: grafana security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-06809

Уязвимость компонента Custom Frontend Plugin платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)

CVSS3: 7.6
2%
Низкий
3 месяца назад
redos логотип
ROS-20250619-15

Множественные уязвимости grafana

CVSS3: 8.3
около 2 месяцев назад
ubuntu логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
2%
Низкий
2 месяца назад
redhat логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
2%
Низкий
3 месяца назад
nvd логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

CVSS3: 7.6
2%
Низкий
2 месяца назад
debian логотип
CVE-2025-4123

A cross-site scripting (XSS) vulnerability exists in Grafana caused by ...

CVSS3: 7.6
2%
Низкий
2 месяца назад
github логотип
GHSA-q53q-gxq9-mgrj

Grafana Cross-Site-Scripting (XSS) via custom loaded frontend plugin

CVSS3: 7.6
2%
Низкий
2 месяца назад
oracle-oval логотип
ELSA-2025-7894

ELSA-2025-7894: grafana security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-7893

ELSA-2025-7893: grafana security update (IMPORTANT)

2 месяца назад
oracle-oval логотип
ELSA-2025-7892

ELSA-2025-7892: grafana security update (IMPORTANT)

около 1 месяца назад

Уязвимостей на страницу