fkie_cve-2025-8341
Vulnerability from fkie_nvd
Published
2025-08-04 09:15
Modified
2025-08-04 15:06
Severity ?
Summary
Grafana is an open-source platform for monitoring and observability. The Infinity datasource plugin, maintained by Grafana Labs, allows visualizing data from JSON, CSV, XML, GraphQL, and HTML endpoints.
If the plugin was configured to allow only certain URLs, an attacker could bypass this restriction using a specially crafted URL. This vulnerability is fixed in version 3.4.1.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Grafana is an open-source platform for monitoring and observability. The Infinity datasource plugin, maintained by Grafana Labs, allows visualizing data from JSON, CSV, XML, GraphQL, and HTML endpoints.\n\n\nIf the plugin was configured to allow only certain URLs, an attacker could bypass this restriction using a specially crafted URL. This vulnerability is fixed in version 3.4.1." }, { "lang": "es", "value": "Grafana es una plataforma de c\u00f3digo abierto para la monitorizaci\u00f3n y la observabilidad. El complemento de origen de datos Infinity, mantenido por Grafana Labs, permite visualizar datos desde endpoints JSON, CSV, XML, GraphQL y HTML. Si el complemento estuviera configurado para permitir solo ciertas URL, un atacante podr\u00eda eludir esta restricci\u00f3n utilizando una URL especialmente manipulado. Esta vulnerabilidad se ha corregido en la versi\u00f3n 3.4.1." } ], "id": "CVE-2025-8341", "lastModified": "2025-08-04T15:06:15.833", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 1.4, "source": "security@grafana.com", "type": "Secondary" } ] }, "published": "2025-08-04T09:15:26.103", "references": [ { "source": "security@grafana.com", "url": "https://github.com/grafana/grafana-infinity-datasource/releases/tag/v3.4.1" }, { "source": "security@grafana.com", "url": "https://grafana.com/security/security-advisories/cve-2025-8341/" } ], "sourceIdentifier": "security@grafana.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "security@grafana.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…