BIT-grafana-2025-3454

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/grafana/BIT-grafana-2025-3454.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-grafana-2025-3454
Aliases
Published
2025-06-04T14:44:58.591Z
Modified
2025-06-09T18:42:01.892131Z
Summary
[none]
Details

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.

Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.

The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.

Database specific
{
    "severity": "Medium",
    "cpes": [
        "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
        "cpe:2.3:a:grafana:grafana:*:*:*:*:*:go:*:*"
    ]
}
References

Affected packages

Bitnami / grafana

Package

Name
grafana
Purl
pkg:bitnami/grafana

Severity

  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
10.4.0
Fixed
10.4.17
Introduced
11.2.0
Fixed
11.5.3
Introduced
11.6.0
Fixed
11.6.0