CVE-2025-4123

Published May 22, 2025

Last updated 3 hours ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-4123 is a cross-site scripting (XSS) vulnerability found in Grafana. It stems from a combination of client path traversal and an open redirect issue within the handling of custom frontend plugins. This flaw allows attackers to redirect users to malicious websites and execute arbitrary JavaScript code. The vulnerability is particularly concerning because it can be exploited even without editor permissions, especially if anonymous access is enabled in Grafana. Furthermore, if the Grafana Image Renderer plugin is installed, the vulnerability can be escalated to a full read Server-Side Request Forgery (SSRF), potentially exposing internal services and cloud metadata. All supported versions of Grafana OSS and Grafana Enterprise, starting from Grafana 8 are affected.

Description
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
Source
security@grafana.com
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.6
Impact score
4.7
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
Severity
HIGH

Weaknesses

security@grafana.com
CWE-79

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

30

  1. 🚨 Critical XSS vulnerability in Grafana (CVE-2025-4123) allows redirection & JS injection — no privileges needed. If you self-host Grafana, patch now. Affected: 8.x–12.0.0. #CyberSecurity #XSS #Grafana #CVE20254123 https://t.co/KbabJLkaqd

    @threatsbank

    23 May 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. GitHub - NightBloodz/CVE-2025-4123: Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF https://t.co/8eyy4Mp899

    @Dinosn

    23 May 2025

    5077 Impressions

    32 Retweets

    117 Likes

    31 Bookmarks

    0 Replies

    1 Quote

  3. GitHub - NightBloodz/CVE-2025-4123: Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF - https://t.co/XrShAqkuew

    @piedpiper1616

    22 May 2025

    1676 Impressions

    12 Retweets

    23 Likes

    11 Bookmarks

    0 Replies

    0 Quotes

  4. Grafana: CVE-2025-4123 Exploit https://t.co/nByMWvV8XN https://t.co/wiuiN5beP6

    @nightbloodz_

    22 May 2025

    147 Impressions

    0 Retweets

    6 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  5. Grafana has issued high-severity security patches for CVE-2025-4123 to all supported versions 8.0+, addressing a critical XSS vulnerability that can lead to malicious redirects & session hijacking. Cloud services remain unaffected. 🚨 #Grafana #SecurityU… https://t.co/23h

    @TweetThreatNews

    22 May 2025

    51 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  6. CVE-2025-4123: 0-day in Grafana, 7.6 rating❗️ Grafana Labs has released an unscheduled update that fixes an XSS injection vulnerability in all supported versions. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/2Wt7ex3e29 #cybersecurity #vulnerability_map https

    @Netlas_io

    22 May 2025

    71 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. Grafanaにおいて深刻度の高いXSS脆弱性(CVE-2025-4123)が報告された。 CVSSスコアは7.6で、カスタムフロントエンドプラグインを通じてパスの不正処理やオープンリダイレクトを悪用し、任意のJavaScriptを実行可能

    @yousukezan

    22 May 2025

    4785 Impressions

    7 Retweets

    18 Likes

    6 Bookmarks

    0 Replies

    0 Quotes

  8. Just found an open redirect in Grafana (CVE-2025-4123) that allows 2 exploitation paths – Full Read SSRF & account takeover. 🔥 Easily my best bug so far. Full write-up: https://t.co/iMN8hIoAsp #bugbounty #infosec #cybersecurity https://t.co/UBHat7itcT

    @nightbloodz_

    22 May 2025

    853 Impressions

    4 Retweets

    16 Likes

    4 Bookmarks

    1 Reply

    0 Quotes

  9. Grafanaで定例更新の1日前に脆弱性が修正された。CVE-2025-4123は深刻なXSSで、認証不要で悪用可能。即時更新が推奨されている。脆弱性が公開されたため定例更新を待たず修正したと公式。クライアントパストラ

    @__kokumoto

    22 May 2025

    1010 Impressions

    3 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. ⚡️The vulnerability details are now available: https://t.co/TMtGakAeCu 🚨🚨CVE-2025-4123: Grafana XSS vuln exposed! Hackers can exploit client path traversal & open redirect in custom plugins to redirect users to malicious sites, executing rogue JavaScript. Session

    @zoomeye_team

    22 May 2025

    1780 Impressions

    9 Retweets

    23 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

References

Sources include official advisories and independent security research.