grafana vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grafana package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Origin Validation Error

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • H
Directory Traversal

*
  • M
CVE-2025-68121

<0:10.2.6-22.el10_1
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Allocation of Resources Without Limits or Throttling

<0:10.2.6-22.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-22.el10_1
  • H
Authorization Bypass Through User-Controlled Key

<0:10.2.6-22.el10_1
  • M
Deserialization of Untrusted Data

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Excessive Platform Resource Consumption within a Loop

<0:10.2.6-22.el10_1
  • M
Improper Certificate Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Integer Overflow or Wraparound

*
  • M
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-21.el10_1
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Inefficient Regular Expression Complexity

*
  • L
Open Redirect

*
  • L
Authorization Bypass Through User-Controlled Key

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficient Compartmentalization

*
  • M
Inefficient Regular Expression Complexity

*
  • M
CVE-2025-4673

*
  • H
Cross-site Scripting (XSS)

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • H
Cross-site Scripting (XSS)

<0:10.2.6-17.el10_0
  • M
Arbitrary Code Injection

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Incomplete Filtering of Special Elements

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

<0:10.2.6-18.el10_0
  • M
Information Exposure

*
  • M
CRLF Injection

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • H
Asymmetric Resource Consumption (Amplification)

<0:10.2.6-15.el10_0
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Access Control

*