Loading HuntDB...

GHSA-q53q-gxq9-mgrj

GitHub Security Advisory

Grafana Cross-Site-Scripting (XSS) via custom loaded frontend plugin

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.

The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.

Affected Packages

Go github.com/grafana/grafana
Affected versions: 0 (fixed in 0.0.0-20250521183405-c7a690348df7)

Related CVEs

Key Information

GHSA ID
GHSA-q53q-gxq9-mgrj
Published
May 22, 2025 9:33 AM
Last Modified
July 21, 2025 12:42 PM
CVSS Score
7.5 /10
Primary Ecosystem
Go
Primary Package
github.com/grafana/grafana
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 11, 2025 6:32 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.