CVE-2026-21722

5.3 MEDIUM

📋 TL;DR

This vulnerability in Grafana allows attackers to view annotation data outside the locked timerange on public dashboards with annotations enabled. Organizations using Grafana with public dashboards and annotation features are affected. The vulnerability exposes historical annotation data that should be restricted by dashboard time settings.

💻 Affected Systems

Products:
  • Grafana
Versions: Specific version range not provided in advisory
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects public dashboards with annotations enabled; internal dashboards and dashboards without annotations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive historical annotation data containing confidential information, timestamps, or operational details could be exposed to unauthorized users accessing public dashboards.

🟠

Likely Case

Unauthorized users can view annotation history beyond the intended time window, potentially revealing historical operational data, comments, or timeline information that should be restricted.

🟢

If Mitigated

With proper access controls and dashboard configuration, only non-sensitive annotation data within intended time ranges would be accessible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to a public dashboard URL with annotations enabled; no authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Grafana security advisory for specific patched versions

Vendor Advisory: https://grafana.com/security/security-advisories/CVE-2026-21722

Restart Required: Yes

Instructions:

1. Review Grafana security advisory for affected versions. 2. Upgrade to patched version. 3. Restart Grafana service. 4. Verify public dashboards function correctly.

🔧 Temporary Workarounds

Disable annotations on public dashboards

all

Remove annotation functionality from all public dashboards

Navigate to dashboard settings > Annotations > Disable annotations

Make dashboards private

all

Convert public dashboards to require authentication

Navigate to dashboard settings > General > Make dashboard private

🧯 If You Can't Patch

  • Disable annotations on all public dashboards immediately
  • Review and remove any sensitive information from existing annotations

🔍 How to Verify

Check if Vulnerable:

Check if you have public dashboards with annotations enabled and test if annotation data outside locked timerange is accessible

Check Version:

grafana-server -v

Verify Fix Applied:

After patching, verify that annotations on public dashboards respect the locked timerange and historical data outside that range is inaccessible

📡 Detection & Monitoring

Log Indicators:

  • Unusual annotation queries on public dashboards
  • Multiple requests for annotation data with varying time parameters

Network Indicators:

  • HTTP requests to annotation endpoints on public dashboard URLs with manipulated time parameters

SIEM Query:

source="grafana" AND (uri_path="/api/annotations" OR uri_path="*annotation*") AND http_method=GET AND NOT user_agent="internal"

🔗 References

📤 Share & Export