Description
This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.
Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.
The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-3454, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-3454 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- https://capec.mitre.org/data/definitions/1.html
- https://capec.mitre.org/data/definitions/104.html
- https://capec.mitre.org/data/definitions/127.html
- https://capec.mitre.org/data/definitions/13.html
- https://capec.mitre.org/data/definitions/17.html
- https://capec.mitre.org/data/definitions/39.html
- https://capec.mitre.org/data/definitions/402.html
- https://capec.mitre.org/data/definitions/45.html
- https://capec.mitre.org/data/definitions/5.html
- https://capec.mitre.org/data/definitions/51.html
- https://capec.mitre.org/data/definitions/59.html
- https://capec.mitre.org/data/definitions/60.html
- https://capec.mitre.org/data/definitions/647.html
- https://capec.mitre.org/data/definitions/668.html
- https://capec.mitre.org/data/definitions/76.html
- https://capec.mitre.org/data/definitions/77.html
- https://capec.mitre.org/data/definitions/87.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-3454