Open Redirect Affecting github.com/grafana/grafana/pkg/middleware package, versions <11.3.8+security-01>=11.4.0 <11.4.6+security-01>=11.5.0 <11.5.6+security-01>=11.6.0 <11.6.3+security-01>=12.0.0 <12.0.2+security-01


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.32% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMGRAFANAGRAFANAPKGMIDDLEWARE-11775508
  • published11 Aug 2025
  • disclosed18 Jul 2025
  • creditUnknown

Introduced: 18 Jul 2025

NewCVE-2025-6197  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade github.com/grafana/grafana/pkg/middleware to version 11.3.8+security-01, 11.4.6+security-01, 11.5.6+security-01, 11.6.3+security-01, 12.0.2+security-01 or higher.

Overview

github.com/grafana/grafana/pkg/middleware is a The open-source platform for monitoring and observability.

Affected versions of this package are vulnerable to Open Redirect via the organization switching process. An attacker can redirect users to arbitrary external sites by crafting a malicious URL. This is only exploitable if multiple organizations exist in the instance and the victim is a member of a different organization than the one specified in the URL.

CVSS Base Scores

version 4.0
version 3.1