
We found results for “”
CVE-2025-3454
Good to know:

Date: June 2, 2025
This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources. The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Improper Authorization
CWE-285Top Fix

Upgrade Version
Upgrade to version https://github.com/grafana/grafana.git - v11.6.0+security-01;https://github.com/grafana/grafana.git - v11.5.3+security-01;https://github.com/grafana/grafana.git - v11.4.3+security-01;https://github.com/grafana/grafana.git - v11.3.5+security-01;https://github.com/grafana/grafana.git - v11.2.8+security-01;https://github.com/grafana/grafana.git - v10.4.17+security-01
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |