Description
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
Exploits (11)
exploitdb
WORKING POC
by Beatriz Fresno Naumova · textwebappsmultiple
https://www.exploit-db.com/exploits/52491
nomisec
WORKING POC
30 stars
by ynsmroztas · client-side
https://github.com/ynsmroztas/CVE-2025-4123-Exploit-Tool-Grafana-
nomisec
WORKING POC
2 stars
by punitdarji · infoleak
https://github.com/punitdarji/Grafana-cve-2025-4123
Nuclei Templates (1)
Grafana - XSS / Open Redirect / SSRF via Client Path Traversal
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
product:"Grafana"
FOFA:
app="Grafana"
Scores
CVSS v3
7.6
EPSS
0.0387
EPSS Percentile
88.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
Lab Environment
COMMUNITY
Community Lab
+5 more repos
Details
VulnCheck KEV
2025-07-21
CWE
CWE-601
CWE-79
Status
published
Products (9)
grafana/grafana
10.4.18
grafana/grafana
11.2.9
grafana/grafana
11.3.6
grafana/grafana
11.4.4
grafana/grafana
11.5.4
grafana/grafana
11.6.1
grafana/grafana
12.0.0
grafana/grafana
< 10.4.18
grafana/grafana
0 - 0.0.0-20250521183405-c7a690348df7Go
Published
May 22, 2025
Tracked Since
Feb 18, 2026