Arbitrary Command Injection Affecting grafana package, versions <11.5.5-150200.3.72.2


Severity

Recommended
0.0
critical
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
92.34% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES157-GRAFANA-10390361
  • published19 Jun 2025
  • disclosed18 Jun 2025

Introduced: 18 Jun 2025

NewCVE-2024-9264  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade SLES:15.7 grafana to version 11.5.5-150200.3.72.2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana package and not the grafana package as distributed by SLES. See How to fix? for SLES:15.7 relevant fixed versions and status.

The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

CVSS Base Scores

version 3.1