CVE-2025-3454 — Improper Authorization in Grafana
Severity
5.0MEDIUMNVD
EPSS
0.0%
top 85.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 2
Latest updateJun 9
Description
This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.
Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.
The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:NExploitability: 3.1 | Impact: 1.4
Affected Packages3 packages
▶Gogithub.com/grafana_grafana0.0.0-20210414170620-dadccdda06e6 — 0.0.0-20250424191517-1f707d16ed5d+1
🔴Vulnerability Details
5OSV▶
Grafana's datasource proxy API allows authorization checks to be bypassed in github.com/grafana/grafana↗2025-06-09
CVEList▶
CVE-2025-3454: This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path↗2025-06-02
OSV▶
CVE-2025-3454: This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path↗2025-06-02