CVE-2025-3454

5.0 MEDIUM

📋 TL;DR

This vulnerability in Grafana's datasource proxy API allows users with minimal permissions to bypass authorization checks by adding an extra slash character in URL paths. It enables unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources. Organizations using affected Grafana versions with these datasources are at risk.

💻 Affected Systems

Products:
  • Grafana
Versions: Grafana versions 10.4.0 through 10.4.3, 11.0.0 through 11.1.3, 11.2.0 through 11.2.1
Operating Systems: All platforms running affected Grafana versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects datasources implementing route-specific permissions, primarily Alertmanager and certain Prometheus-based datasources.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with minimal Grafana permissions could access sensitive monitoring data from Alertmanager and Prometheus, potentially exposing alert configurations, metrics, and system state information.

🟠

Likely Case

Internal users with basic permissions could inadvertently or intentionally access monitoring data they shouldn't see, potentially violating data segregation policies.

🟢

If Mitigated

With proper network segmentation and minimal necessary permissions, impact is limited to unauthorized data viewing within the monitoring system.

🌐 Internet-Facing: MEDIUM - If Grafana is exposed to the internet, attackers could exploit this if they obtain basic user credentials.
🏢 Internal Only: MEDIUM - Internal threat actors or compromised accounts could exploit this to access unauthorized monitoring data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid Grafana user credentials with minimal permissions. The bypass technique is simple (adding extra slash to URL).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Grafana 10.4.4, 11.1.4, 11.2.2

Vendor Advisory: https://grafana.com/security/security-advisories/cve-2025-3454/

Restart Required: Yes

Instructions:

1. Backup your Grafana configuration and database. 2. Stop Grafana service. 3. Upgrade to patched version using your package manager or download from Grafana website. 4. Restart Grafana service. 5. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Restrict datasource access

all

Limit user permissions to only necessary datasources and implement strict role-based access control.

# Review and adjust Grafana user permissions via UI or API
# Use Grafana's built-in role management to restrict datasource access

🧯 If You Can't Patch

  • Implement network segmentation to isolate Grafana from sensitive monitoring backends
  • Enable detailed audit logging for all datasource proxy API calls and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check Grafana version via web interface (Admin → Server Admin → Stats) or command line: grafana-server -v

Check Version:

grafana-server -v 2>/dev/null || grafana-server version 2>/dev/null || cat /etc/grafana/grafana.ini | grep version

Verify Fix Applied:

After patching, verify version is 10.4.4, 11.1.4, or 11.2.2 or higher. Test that adding extra slashes to datasource URLs no longer bypasses permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of datasource proxy API calls with double slashes in URLs
  • Access to Alertmanager/Prometheus endpoints by users without proper permissions

Network Indicators:

  • HTTP requests to Grafana datasource endpoints containing '//' in URL paths

SIEM Query:

source="grafana" AND (url="*//*" OR path="*//*") AND (datasource="alertmanager" OR datasource="prometheus")

🔗 References

📤 Share & Export