Improper Access Control Affecting grafana-prometheus package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL8-GRAFANAPROMETHEUS-10245043
  • published25 May 2025
  • disclosed23 May 2025

Introduced: 23 May 2025

NewCVE-2025-3580  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 grafana-prometheus.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana-prometheus package and not the grafana-prometheus package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

An access control vulnerability was discovered in Grafana OSS where an Organization administrator could permanently delete the Server administrator account. This vulnerability exists in the DELETE /api/org/users/ endpoint.

The vulnerability can be exploited when:

  1. An Organization administrator exists

  2. The Server administrator is either:

    • Not part of any organization, or
    • Part of the same organization as the Organization administrator

Impact:

  • Organization administrators can permanently delete Server administrator accounts

  • If the only Server administrator is deleted, the Grafana instance becomes unmanageable

  • No super-user permissions remain in the system

  • Affects all users, organizations, and teams managed in the instance

The vulnerability is particularly serious as it can lead to a complete loss of administrative control over the Grafana instance.

CVSS Base Scores

version 3.1