CVE-2025-41117

Published Feb 12, 2026

Last updated 12 hours ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-41117 is a remote code execution vulnerability identified in `streamlit-geospatial`, a Streamlit multipage application designed for geospatial uses. The flaw exists in the `pages/10_🌍_Earth_Engine_Datasets.py` file, specifically prior to commit `c4f81d9616d40c60584e36abb15300853a66e489`. The vulnerability arises because the `vis_params` variable on line 115 of the affected file accepts user input, which is subsequently processed by the `eval()` function on line 126. This improper handling of user-supplied data within the `eval()` function allows for remote code execution. The issue has been addressed by commit `c4f81d9616d40c60584e36abb15300853a66e489`.

Description
Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.
Source
security@grafana.com
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
6.8
Impact score
5.2
Exploitability score
1.6
Vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Severity
MEDIUM

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

16

References

Sources include official advisories and independent security research.