Loading HuntDB...

GHSA-q99m-qcv4-fpm7

GitHub Security Advisory

Grafana Command Injection And Local File Inclusion Via Sql Expressions

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

Affected Packages

Go github.com/grafana/grafana
Affected versions: 11.0.0 (fixed in 11.0.6+security-01)
Go github.com/grafana/grafana
Affected versions: 11.1.0 (fixed in 11.1.7+security-01)
Go github.com/grafana/grafana
Affected versions: 11.2.0 (fixed in 11.2.2+security-01)

Related CVEs

Key Information

GHSA ID
GHSA-q99m-qcv4-fpm7
Published
October 18, 2024 6:30 AM
Last Modified
March 14, 2025 8:26 PM
CVSS Score
9.0 /10
Primary Ecosystem
Go
Primary Package
github.com/grafana/grafana
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 6, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.