vulnerability
FreeBSD: VID-45eb98d6-3b13-11f0-97f7-b42e991fc52e (CVE-2025-4123): grafana -- XSS vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:M/Au:N/C:C/I:P/A:P) | May 27, 2025 | May 28, 2025 | Dec 10, 2025 |
Severity
8
CVSS
(AV:N/AC:M/Au:N/C:C/I:P/A:P)
Published
May 27, 2025
Added
May 28, 2025
Modified
Dec 10, 2025
Description
[email protected] reports: A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
Solutions
freebsd-upgrade-package-grafanafreebsd-upgrade-package-grafana8freebsd-upgrade-package-grafana9
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.