Cross-site scripting (XSS) vulnerability in Grafana
Cross-site scripting (XSS) vulnerability in Grafana
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Grafana versions prior to v10.4.18+security-01
Grafana versions prior to v11.2.9+security-01
Grafana versions prior to v11.3.6+security-01
Grafana versions prior to v11.4.4+security-01
Grafana versions prior to v11.5.4+security-01
Grafana versions prior to v11.6.1+security-01
Grafana versions prior to v12.0.0+security-01
Overview
A vulnerability has been reported in Grafana which could be exploited by an attacker to perform cross site scripting (XSS) attack on the targeted system.
Target Audience:
All end-user organizations using Grafana.
Risk Assessment:
Potential for Session hijacking, Credential theft, Malware injection, Phishing & Data exfiltration.
Impact Assessment:
High risk of exploitation of Server-side request forgery (SSRF) vulnerability.
Description
Grafana is an open-source platform for visualizing, monitoring, and alerting on time-series data from various data sources.
This vulnerability exists in Grafana by combining a client-side path traversal with an open redirect. An attacker could exploit this vulnerability by redirecting users to a website that hosts a frontend plugin that will execute arbitrary JavaScript.
Successful exploitation of this vulnerability could allow an attacker to perform cross site scripting on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://grafana.com/security/security-advisories/cve-2025-4123/
Vendor Information
Grafana
https://grafana.com/security/security-advisories/cve-2025-4123/
References
Grafana
https://grafana.com/security/security-advisories/cve-2025-4123/
CVE Name
CVE-2025-4123