Description
Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.
References (4)
Core 4
Core References
Patch, Third Party Advisory
https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57
Patch, Third Party Advisory
https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9
Third Party Advisory
https://github.com/grafana/grafana/releases/tag/v9.1.8
Third Party Advisory
https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr
Scores
CVSS v3
6.8
EPSS
0.0090
EPSS Percentile
75.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-200
Status
published
Products (3)
grafana/grafana
5.0.0 (6 CPE variants)
grafana/grafana
5.0.0-beta1 - 8.5.14Go
grafana/grafana
5.0.1 - 8.5.14
Published
Oct 13, 2022
Tracked Since
Feb 18, 2026