Direct Vulnerabilities

Known vulnerabilities in the grafana package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Origin Validation Error

*
  • M
Out-of-bounds Write

*
  • H
Multiple Locks of a Critical Resource

<0:10.2.6-25.el10_1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • L
Out-of-bounds Write

*
  • M
Improper Validation of Unsafe Equivalence in Input

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Insufficient Compartmentalization

*
  • L
Incorrect Privilege Assignment

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improper Validation of Unsafe Equivalence in Input

*
  • M
Time-of-check Time-of-use (TOCTOU)

<0:10.2.6-25.el10_1
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Unchecked Input for Loop Condition

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Information Exposure

<0:10.2.6-24.el10_1
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Unchecked Input for Loop Condition

*
  • H
Improper Certificate Validation

*
  • H
Improper Validation of Syntactic Correctness of Input

<0:10.2.6-23.el10_1
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-68121

<0:10.2.6-22.el10_1
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Allocation of Resources Without Limits or Throttling

<0:10.2.6-22.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-22.el10_1
  • H
Authorization Bypass Through User-Controlled Key

<0:10.2.6-22.el10_1
  • M
Deserialization of Untrusted Data

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Excessive Platform Resource Consumption within a Loop

<0:10.2.6-22.el10_1
  • M
Improper Certificate Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Integer Overflow or Wraparound

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-21.el10_1
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Inefficient Regular Expression Complexity

*
  • L
Open Redirect

*
  • L
Authorization Bypass Through User-Controlled Key

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficient Compartmentalization

*
  • M
Inefficient Regular Expression Complexity

*
  • M
CVE-2025-4673

*
  • H
Cross-site Scripting (XSS)

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • H
Cross-site Scripting (XSS)

<0:10.2.6-17.el10_0
  • M
Arbitrary Code Injection

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Incomplete Filtering of Special Elements

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

<0:10.2.6-18.el10_0
  • M
Information Exposure

*
  • M
CRLF Injection

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • H
Asymmetric Resource Consumption (Amplification)

<0:10.2.6-15.el10_0
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Access Control

*