AI description
CVE-2025-4123 is a cross-site scripting (XSS) vulnerability found in Grafana. It stems from a combination of client path traversal and an open redirect issue within the handling of custom frontend plugins. This flaw allows attackers to redirect users to malicious websites and execute arbitrary JavaScript code. The vulnerability is particularly concerning because it can be exploited even without editor permissions, especially if anonymous access is enabled in Grafana. Furthermore, if the Grafana Image Renderer plugin is installed, the vulnerability can be escalated to a full read Server-Side Request Forgery (SSRF), potentially exposing internal services and cloud metadata. All supported versions of Grafana OSS and Grafana Enterprise, starting from Grafana 8 are affected.
- Description
- A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
- Source
- security@grafana.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 7.6
- Impact score
- 4.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
- Severity
- HIGH
- security@grafana.com
- CWE-79
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
30
🚨 Critical XSS vulnerability in Grafana (CVE-2025-4123) allows redirection & JS injection — no privileges needed. If you self-host Grafana, patch now. Affected: 8.x–12.0.0. #CyberSecurity #XSS #Grafana #CVE20254123 https://t.co/KbabJLkaqd
@threatsbank
23 May 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub - NightBloodz/CVE-2025-4123: Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF https://t.co/8eyy4Mp899
@Dinosn
23 May 2025
5077 Impressions
32 Retweets
117 Likes
31 Bookmarks
0 Replies
1 Quote
GitHub - NightBloodz/CVE-2025-4123: Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF - https://t.co/XrShAqkuew
@piedpiper1616
22 May 2025
1676 Impressions
12 Retweets
23 Likes
11 Bookmarks
0 Replies
0 Quotes
Grafana: CVE-2025-4123 Exploit https://t.co/nByMWvV8XN https://t.co/wiuiN5beP6
@nightbloodz_
22 May 2025
147 Impressions
0 Retweets
6 Likes
3 Bookmarks
0 Replies
0 Quotes
Grafana has issued high-severity security patches for CVE-2025-4123 to all supported versions 8.0+, addressing a critical XSS vulnerability that can lead to malicious redirects & session hijacking. Cloud services remain unaffected. 🚨 #Grafana #SecurityU… https://t.co/23h
@TweetThreatNews
22 May 2025
51 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-4123: 0-day in Grafana, 7.6 rating❗️ Grafana Labs has released an unscheduled update that fixes an XSS injection vulnerability in all supported versions. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/2Wt7ex3e29 #cybersecurity #vulnerability_map https
@Netlas_io
22 May 2025
71 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Grafanaにおいて深刻度の高いXSS脆弱性(CVE-2025-4123)が報告された。 CVSSスコアは7.6で、カスタムフロントエンドプラグインを通じてパスの不正処理やオープンリダイレクトを悪用し、任意のJavaScriptを実行可能
@yousukezan
22 May 2025
4785 Impressions
7 Retweets
18 Likes
6 Bookmarks
0 Replies
0 Quotes
Just found an open redirect in Grafana (CVE-2025-4123) that allows 2 exploitation paths – Full Read SSRF & account takeover. 🔥 Easily my best bug so far. Full write-up: https://t.co/iMN8hIoAsp #bugbounty #infosec #cybersecurity https://t.co/UBHat7itcT
@nightbloodz_
22 May 2025
853 Impressions
4 Retweets
16 Likes
4 Bookmarks
1 Reply
0 Quotes
Grafanaで定例更新の1日前に脆弱性が修正された。CVE-2025-4123は深刻なXSSで、認証不要で悪用可能。即時更新が推奨されている。脆弱性が公開されたため定例更新を待たず修正したと公式。クライアントパストラ
@__kokumoto
22 May 2025
1010 Impressions
3 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
⚡️The vulnerability details are now available: https://t.co/TMtGakAeCu 🚨🚨CVE-2025-4123: Grafana XSS vuln exposed! Hackers can exploit client path traversal & open redirect in custom plugins to redirect users to malicious sites, executing rogue JavaScript. Session
@zoomeye_team
22 May 2025
1780 Impressions
9 Retweets
23 Likes
7 Bookmarks
0 Replies
0 Quotes