vulnerability
FreeBSD: VID-6a851dc0-cfd2-11ee-ac09-6c3be5272acd (CVE-2023-6152): Grafana -- Email verification is not required after email change
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:S/C:N/I:P/A:P) | Feb 20, 2024 | Feb 25, 2024 | Dec 10, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:P)
Published
Feb 20, 2024
Added
Feb 25, 2024
Modified
Dec 10, 2025
Description
Grafana Labs reports: The vulnerability impacts instances where Grafana basic authentication is enabled. Grafana has a verify_email_enabled configuration option. When this option is enabled, users are required to confirm their email addresses before the sign-up process is complete. However, the email is only checked at the time of the sign-up. No further verification is carried out if a user’s email address is updated after the initial sign-up. Moreover, Grafana allows using an email address as the user’s login name, and no verification is ever carried out for this email address. This means that even if the verify_email_enabled configuration option is enabled, users can use unverified email addresses to log into Grafana if the email address has been changed after the sign up, or if an email address is set as the login name. The CVSS score for this vulnerability is [5.4 Medium] (CVSS).
Solutions
freebsd-upgrade-package-grafanafreebsd-upgrade-package-grafana9freebsd-upgrade-package-grafana10
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.