GHSA-q99m-qcv4-fpm7
GitHub Security Advisory
Grafana Command Injection And Local File Inclusion Via Sql Expressions
✓ GitHub Reviewed
CRITICAL
Has CVE
Advisory Details
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Affected Packages
Go
github.com/grafana/grafana
Affected versions:
11.0.0
(fixed in 11.0.6+security-01)
Go
github.com/grafana/grafana
Affected versions:
11.1.0
(fixed in 11.1.7+security-01)
Go
github.com/grafana/grafana
Affected versions:
11.2.0
(fixed in 11.2.2+security-01)
Related CVEs
Key Information
9.0
/10
Dataset
Last updated: July 6, 2025 6:30 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.