-
Notifications
You must be signed in to change notification settings - Fork 56
Open
Description
Summary
Our public Grafana appears affected by CVE‑2025‑4123 (open redirect + client‑side path traversal leading to XSS; when chained, can enable full‑read SSRF). A crafted request to a static route returned a 302 redirect to an external destination. No payloads were executed; PoC withheld.
Grafana Labs
Scope / Affected
Asset: Public Grafana monitoring dashboard: https://monitoring.threshold.network
Auth: Behavior reproducible without authentication.
Impact
Open redirect → phishing/session risk.
When chained (custom frontend plugin or Image Renderer installed), can lead to stored XSS and full‑read SSRF against internal services/metadata.
Remediation
- Upgrade Grafana immediately to a patched release or later
- If Image Renderer plugin is present, update to the fixed version or remove if unnecessary.
- Disable anonymous access; require SSO.
- Restrict public exposure (VPN/allowlist) and add WAF rules to block traversal/redirect patterns under /public (hardening).
Metadata
Metadata
Assignees
Labels
No labels