Severity
7.5HIGHNVD
EPSS
0.0%
top 94.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27

Description

Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine blocks forever trying to send on an unbuffered channel. Sustained traffic with random hashes keeps tripping this timeout, so goroutine count grows linearly, eventually exhausting memory and causing Grafana to crash on some systems.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgrafana/grafana3.0.011.6.9+4
CVEListV5grafana/grafana_grafana3.0.011.6.9+4
CVEListV5grafana/grafana_grafana-enterprise3.0.011.6.9+4

🔴Vulnerability Details

3
GHSA
GHSA-m4rj-q4ph-fr4v: Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image2026-01-27
CVEList
Unauthenticated DoS: avatar cache leaks goroutines when /avatar/:hash requests time out2026-01-27
OSV
CVE-2026-21720: Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image2026-01-27

📋Vendor Advisories

1
Red Hat
grafana: Grafana: Denial of Service via resource exhaustion from avatar requests2026-01-27

🕵️Threat Intelligence

1
Wiz
CVE-2026-21720 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-21720 — Uncontrolled Resource Consumption | cvebase