Search

published date: May 22, 2025

CVE-2025-4123 : Cross-Site Scripting (XSS) Vulnerability, Open Redirect Vulnerability, SSRF Vulnerability

Grafana - Jun2025

Description

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

Product(s):

  • Grafana 10.0.0
  • GRAFANA > grafana 10.*.*
  • Grafana 10.0.12

Question to Ask Vendors:

  1. Have you upgraded all instances of Grafana to versions 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, or 12.0.0+security-01 to mitigate the risk of CVE-2025-4123?
  2. Have you implemented strict whitelists of allowed plugin sources and required explicit admin approval to prevent the loading of malicious frontend plugins as described in the CVE-2025-4123 advisory?
  3. Have you disabled anonymous access and hardened redirects by restricting or removing unneeded open-redirect endpoints via server or proxy rules to prevent potential XSS attacks and full-read SSRF as recommended in the advisory?
  4. Have you extended your Content-Security-Policy to disallow connect-src to untrusted hosts entirely, as a measure to block most script sources and mitigate the risk of the bypass described in the CVE-2025-4123 advisory?

READY TO GET RESULTS YOU CAN TRUST?