Server-side Request Forgery (SSRF) Affecting github.com/grafana/grafana-infinity-datasource/pkg/infinity package, versions <3.4.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMGRAFANAGRAFANAINFINITYDATASOURCEPKGINFINITY-11483955
  • published6 Aug 2025
  • disclosed4 Aug 2025
  • creditUnknown

Introduced: 4 Aug 2025

NewCVE-2025-8341  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade github.com/grafana/grafana-infinity-datasource/pkg/infinity to version 3.4.1 or higher.

Overview

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the URL validation process. An attacker can access internal or otherwise restricted resources by submitting a specially crafted URL that bypasses configured allowlists.

CVSS Base Scores

version 4.0
version 3.1