CVE-2025-12141 Affecting grafana-11.5-oci-compat package, versions *


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-GRAFANA115OCICOMPAT-16105575
  • published19 Apr 2026
  • disclosed15 Apr 2026

Introduced: 15 Apr 2026

NewCVE-2025-12141  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest grafana-11.5-oci-compat.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana-11.5-oci-compat package and not the grafana-11.5-oci-compat package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

In Grafana's alerting system, users with edit permissions for a contact point, specifically the permissions “alert.notifications:write” or “alert.notifications.receivers:test” that are granted as part of the fixed role "Contact Point Writer", which is part of the basic role Editor - can edit contact points created by other users, modify the endpoint URL to a controlled server. By invoking the test functionality, attackers can capture and extract redacted secure settings, such as authentication credentials for third-party services (e.g., Slack tokens). This leads to unauthorized access and potential compromise of external integrations.

CVSS Base Scores

version 3.1