CVE-2025-3454 Affecting grafana-11.5-oci-compat package, versions <11.5.3-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-GRAFANA115OCICOMPAT-13314370
  • published6 Oct 2025
  • disclosed2 Jun 2025

Introduced: 2 Jun 2025

CVE-2025-3454  (opens in a new tab)

How to fix?

Upgrade Minimos:latest grafana-11.5-oci-compat to version 11.5.3-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana-11.5-oci-compat package and not the grafana-11.5-oci-compat package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.

Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.

The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.

CVSS Base Scores

version 3.1