Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Grafana Vulnerability Let Attackers Escalate Privilege

Critical Grafana Vulnerability Let Attackers Escalate Privilege

Posted on November 21, 2025November 21, 2025 By CWS

Grafana Labs has disclosed a vital safety vulnerability affecting Grafana Enterprise that would permit attackers to escalate privileges and impersonate customers.

The flaw, tracked as CVE-2025-41115, has acquired the utmost CVSS rating of 10.0, making it one of the crucial extreme vulnerabilities found in current occasions.

The vulnerability exists in Grafana’s SCIM (System for Cross-domain Id Administration) setup characteristic, which was launched in April 2025 to assist organizations automate consumer lifecycle administration.

The problem impacts Grafana Enterprise variations 12.0.0 by way of 12.2.1, the place SCIM setup is enabled and configured.

In accordance with Grafana Labs, the vulnerability stems from incorrect dealing with of consumer identities. A malicious or compromised SCIM shopper may provision a consumer with a numeric externalId, probably overriding inner consumer IDs.

AttributeDetailsCVE IDCVE-2025-41115Vulnerability TypeIncorrect Privilege Task / Person ImpersonationCVSS Score10.0SeverityCriticalAffected ProductsGrafana Enterprise (with SCIM provisioning enabled)Affected VersionsGrafana Enterprise 12.0.0 to 12.2.1

This might permit attackers to impersonate current customers, together with directors, main to finish system compromise.

The flaw impacts solely programs the place each the enableSCIM characteristic flag and the user_sync_enabled configuration choice are set to true. This vulnerability doesn’t influence Grafana OSS customers.

Grafana Labs found the vulnerability throughout inner safety audits on November 4, 2025, and instantly declared an inner incident.

The corporate confirmed no exploitation occurred in Grafana Cloud environments and launched patches inside days.

Organizations working affected variations ought to improve instantly to patched variations, together with Grafana Enterprise 12.3.0, 12.2.1, 12.1.3, or 12.0.6.

Grafana Cloud clients and managed service customers on Amazon and Azure platforms have already acquired automated safety updates.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Critical, Escalate, Grafana, Privilege, Vulnerability

Post navigation

Previous Post: Why IT Admins Choose Samsung for Mobile Security
Next Post: Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack

Related Posts

How to Radically Cut Response Time for Each Security Incident  How to Radically Cut Response Time for Each Security Incident  Cyber Security News
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News
Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Cyber Security News
Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark