Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

Posted on July 20, 2025July 20, 2025 By CWS

Two vital Grafana vulnerabilities that might permit attackers to redirect customers to malicious web sites and execute arbitrary JavaScript code. 

The vulnerabilities, recognized as CVE-2025-6023 and CVE-2025-6197, have an effect on a number of variations of Grafana, together with 12.0.x, 11.6.x, 11.5.x, 11.4.x, and 11.3.x branches. 

Each safety flaws have been found by means of Grafana’s bug bounty program, with researchers Hoa X. Nguyen from OPSWAT and Dat Phung answerable for the respective discoveries.

Key Takeaways1. CVE-2025-6023 (XSS) and CVE-2025-6197 (redirect) in Grafana variations have been patched2. Attackers can redirect customers and execute malicious code.3. Improve instantly or apply Content material Safety Coverage mitigations.

Excessive-Severity XSS Vulnerability 

The extra critical vulnerability, CVE-2025-6023, carries a CVSS rating of seven.6 and represents a high-severity cross-site scripting (XSS) assault vector. 

This vulnerability exploits shopper path traversal and open redirect mechanisms, enabling attackers to redirect customers to malicious web sites that may execute arbitrary JavaScript code inside scripted dashboards. 

What makes this vulnerability significantly harmful is that it doesn’t require editor permissions to use, and if nameless entry is enabled, the XSS assault turns into instantly viable.

The vulnerability impacts Grafana variations >= 11.5.0 and poses vital dangers to Grafana Cloud customers since their Content material-Safety-Coverage lacks a connect-src directive, which is important for stopping attackers from fetching exterior JavaScript. 

Whereas attackers don’t want direct entry to craft payloads, victims have to be authenticated with at the very least Viewer permissions for profitable JavaScript execution. 

The potential impression consists of session hijacking and full account takeover by means of malicious script execution.

Medium-Severity Open Redirect Flaw 

CVE-2025-6197, with a CVSS rating of 4.2, represents a medium-severity open redirect vulnerability inside Grafana’s group switching performance. 

This vulnerability requires particular situations for exploitation: the Grafana occasion should help a number of organizations, the focused consumer have to be a member of each organizations being switched between, and the attacker should possess information of the group ID at the moment being seen.

Notably, Grafana Cloud customers stay unaffected by this explicit vulnerability for the reason that platform doesn’t help Organizations. 

Nevertheless, the open redirect mechanism can probably be chained with different assaults to attain XSS, just like the patterns noticed in CVE-2025-6023 and the earlier vulnerability CVE-2025-4123.

CVETitleAffected VersionsPatched VersionsCVSS 3.1 ScoreSeverityCVE-2025-6023XSS by way of shopper path traversal and open redirect>= Grafana 11.5.012.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, 11.3.8+security-017.6HighCVE-2025-6197Open redirect by way of group switching>= Grafana 11.5.012.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, 11.3.8+security-014.2Medium

Patches Obtainable 

Grafana Labs has launched complete safety patches throughout all affected variations, together with Grafana 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, and 11.3.8+security-01. 

For organizations unable to right away improve, non permanent mitigation methods can be found.

For CVE-2025-6023, directors can implement Content material Safety Coverage configurations utilizing the next template:

For CVE-2025-6197, directors can block Grafana URLs starting with / (%2Fpercent5C) of their ingress configuration or restrict cases to single group deployments.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Code, Dashboards, Execution, Grafana, Malicious, Redirection, Sites, User, Vulnerabilities

Post navigation

Previous Post: SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access
Next Post: Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

Related Posts

Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
Abusing dMSA with Advanced Active Directory Persistence Techniques  Cyber Security News
Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups Cyber Security News
Microsoft Announces New Security Defaults for Windows 365 Cloud PCs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More
  • EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More
  • EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News