grafana vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grafana package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • H
CVE-2025-68121

<0:10.2.6-18.el9_7
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Directory Traversal

*
  • M
Unchecked Input for Loop Condition

*
  • M
Incorrect Behavior Order: Early Validation

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Directory Traversal

*
  • H
Improper Neutralization of Equivalent Special Elements

*
  • M
Information Exposure

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Improper Validation of Integrity Check Value

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • L
Server-Side Request Forgery (SSRF)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Allocation of Resources Without Limits or Throttling

<0:10.2.6-18.el9_7
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

<0:10.2.6-18.el9_7
  • H
Authorization Bypass Through User-Controlled Key

<0:10.2.6-18.el9_7
  • H
Link Following

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Deserialization of Untrusted Data

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Directory Traversal

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Excessive Platform Resource Consumption within a Loop

<0:10.2.6-18.el9_7
  • M
Improper Certificate Validation

*
  • L
CVE-2025-58186

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • M
Integer Overflow or Wraparound

*
  • M
Reachable Assertion

*
  • M
Missing Encryption of Sensitive Data

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

<0:10.2.6-17.el9_7
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Link Following

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Open Redirect

*
  • M
Resource Exhaustion

*
  • M
CVE-2025-4673

*
  • L
Improper Input Validation

*
  • L
Inefficient Regular Expression Complexity

*
  • L
Improper Input Validation

*
  • M
Origin Validation Error

*
  • M
Exposed Dangerous Method or Function

*
  • M
Improper Access Control

*
  • H
Cross-site Scripting (XSS)

<0:10.2.6-13.el9_6
  • M
Incomplete Filtering of Special Elements

*
  • M
Cross-site Scripting (XSS)

*
  • M
HTTP Request Smuggling

<0:10.2.6-14.el9_6
  • H
Asymmetric Resource Consumption (Amplification)

<0:10.2.6-11.el9_6
  • M
Improper Input Validation

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Arbitrary Code Injection

*
  • H
Cross-site Scripting (XSS)

<0:10.2.6-7.el9_5
  • H
Arbitrary Argument Injection

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Authorization Bypass Through User-Controlled Key

*
  • M
CRLF Injection

*
  • L
Improper Verification of Cryptographic Signature

*
  • H
Use of Uninitialized Variable

<0:9.2.10-19.el9_4
  • M
Insufficient Compartmentalization

*
  • M
Insufficiently Protected Credentials

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • H
Uncontrolled Recursion

<0:10.2.6-7.el9_5
  • M
Uncontrolled Recursion

*
  • M
Improper Input Validation

<0:10.2.6-4.el9
  • M
Information Exposure Through Log Files

<0:10.2.6-4.el9
  • M
Improper Input Validation

<0:10.2.6-4.el9
  • M
Misinterpretation of Input

<0:10.2.6-4.el9
  • M
Authentication Bypass

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:10.2.6-4.el9
  • M
Authorization Bypass Through User-Controlled Key

<0:9.2.10-16.el9_4
  • M
Memory Leak

<0:9.2.10-16.el9_4
  • M
Arbitrary Code Injection

*
  • M
Improper Certificate Validation

*
  • M
Misinterpretation of Input

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • C
Directory Traversal

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

<0:9.0.9-4.el9_2
  • M
Resource Exhaustion

<0:9.0.9-4.el9_2
  • M
Buffer Access with Incorrect Length Value

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • C
Authentication Bypass by Primary Weakness

<0:9.0.9-3.el9_2
  • H
Inefficient Regular Expression Complexity

*
  • M
Missing Synchronization

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Arbitrary Code Injection

*
  • M
Resource Exhaustion

<0:9.2.10-7.el9_3
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:9.2.10-7.el9_3
  • M
External Control of Assumed-Immutable Web Parameter

<0:9.2.10-7.el9_3
  • M
Allocation of Resources Without Limits or Throttling

<0:9.2.10-7.el9_3
  • M
Authentication Bypass by Primary Weakness

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Incorrect Implementation of Authentication Algorithm

<0:9.2.10-7.el9_3
  • M
Information Exposure

<0:9.2.10-7.el9_3
  • M
Inefficient Regular Expression Complexity

*
  • M
Improper Authentication

<0:9.0.9-2.el9
  • M
CVE-2022-39201

<0:9.2.10-7.el9_3
  • M
Insufficiently Protected Credentials

<0:9.2.10-7.el9_3
  • M
Improper Verification of Cryptographic Signature

<0:9.2.10-7.el9_3
  • M
CVE-2022-41715

<0:9.0.9-2.el9
  • M
HTTP Request Smuggling

<0:9.0.9-2.el9
  • M
Authentication Bypass

<0:9.0.9-2.el9
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

<0:9.0.9-2.el9
  • L
Resource Exhaustion

*
  • H
Information Exposure

<0:7.5.15-3.el9
  • H
Improper Authentication

<0:7.5.11-5.el9_0
  • H
Improperly Controlled Sequential Memory Allocation

<0:7.5.15-3.el9
  • H
Improperly Controlled Sequential Memory Allocation

<0:7.5.15-3.el9
  • H
Improperly Controlled Sequential Memory Allocation

<0:7.5.15-3.el9
  • H
Improperly Controlled Sequential Memory Allocation

<0:7.5.15-3.el9
  • H
Improperly Controlled Sequential Memory Allocation

<0:7.5.15-3.el9
  • H
Improperly Controlled Sequential Memory Allocation

<0:7.5.15-3.el9
  • H
Improperly Controlled Sequential Memory Allocation

<0:7.5.15-3.el9
  • H
HTTP Request Smuggling

<0:7.5.15-3.el9
  • L
Directory Traversal

*
  • M
Open Redirect

*
  • L
Insufficient Entropy

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Missing Release of Resource after Effective Lifetime

<0:7.5.15-3.el9
  • H
Cross-site Scripting (XSS)

<0:7.5.15-3.el9
  • H
Incorrect Authorization

<0:7.5.15-3.el9
  • H
Cross-site Scripting (XSS)

<0:7.5.15-3.el9
  • H
Cross-site Request Forgery (CSRF)

<0:7.5.15-3.el9
  • H
Information Exposure

<0:7.5.15-3.el9