GHSA-9j65-rv5x-4vrf

Suggest an improvement
Source
https://github.com/advisories/GHSA-9j65-rv5x-4vrf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-9j65-rv5x-4vrf/GHSA-9j65-rv5x-4vrf.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9j65-rv5x-4vrf
Aliases
Downstream
Published
2025-06-02T12:30:33Z
Modified
2025-06-09T18:42:01.892131Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N CVSS Calculator
Summary
Grafana's datasource proxy API allows authorization checks to be bypassed
Details

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.

Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.

The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.

Database specific
{
    "github_reviewed": true,
    "severity": "MODERATE",
    "nvd_published_at": "2025-06-02T11:15:22Z",
    "github_reviewed_at": "2025-06-05T05:42:46Z",
    "cwe_ids": [
        "CWE-285"
    ]
}
References

Affected packages

Go / github.com/grafana/grafana

Package

Name
github.com/grafana/grafana
View open source insights on deps.dev
Purl
pkg:golang/github.com/grafana/grafana

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-20210414170620-dadccdda06e6
Fixed
0.0.0-20250424191517-1f707d16ed5d