
[CIVN-2025-0341] Privilege Escalation Vulnerability in Grafana Enterprise
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Privilege Escalation Vulnerability in Grafana Enterprise
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: Critical
Software Affected
Grafana Enterprise (versions 12.0.0 through 12.2.1)
Overview:
A vulnerability has been reported in Grafana Enterprise that could allow an attacker to do privilege escalation or gain unauthorized access to sensitive data under certain configurations.
Target Audience:
All organizations using Grafana.
Risk Assessment:
High risk of sensitive data exposure and privilege escalation.
Impact Assessment:
Exploitation could grant attackers unauthorized access, enabling data manipulation, and exposure of sensitive information.
Description:
Grafana is an open-source platform for visualizing, monitoring, and alerting on time-series data from various data sources.
This vulnerability exists in Grafana due to improper access control checks in specific enterprise-only features. An authenticated attacker with limited privileges could exploit this vulnerability to bypass certain authorization restrictions and gain access to sensitive dashboards or configuration elements.
Successful exploitation of this vulnerability could allow an attacker unauthorized access to admin functions, enabling data manipulation, and privilege escalation.
Solution:
Apply appropriate updates as mentioned in:
https://grafana.com/blog/2025/11/19/grafana-enterprise-security-update-critical-severity-security-fix-for-cve-2025-41115/
Vendor Information:
https://grafana.com/blog/2025/11/19/grafana-enterprise-security-update-critical-severity-security-fix-for-cve-2025-41115/
References:
https://grafana.com/blog/2025/11/19/grafana-enterprise-security-update-critical-severity-security-fix-for-cve-2025-41115/
https://www.bleepingcomputer.com/news/security/grafana-warns-of-max-severity-admin-spoofing-vulnerability/
CVE Name
CVE-2025-41115
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=dMZC
—–END PGP SIGNATURE—–


