Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks

Posted on June 16, 2025June 16, 2025 By CWS

A important vulnerability affecting over 46,000 publicly accessible Grafana cases worldwide, with 36% of all public-facing deployments weak to finish account takeover assaults. 

The newly found flaw, designated CVE-2025-4123 and dubbed “The Grafana Ghost,” represents a major menace to organizations counting on the favored open-source analytics and visualization platform for monitoring important infrastructure.

Grafana Account Takeover (CVE-2025-4123)

CVE-2025-4123 operates as a classy chain of exploits that begins with a seemingly harmless malicious hyperlink despatched to victims. 

When clicked, the crafted URL forces Grafana to load an exterior malicious plugin hosted on an attacker’s server, enabling arbitrary code execution throughout the sufferer’s browser session. 

The vulnerability particularly targets Grafana’s plugin loading mechanism on the /a/plugin-app/discover endpoint, the place attackers can inject malicious JavaScript modules.

The assault leverages a basic flaw in Grafana’s static file dealing with system, particularly throughout the pkg/api/static/static.go supply code. 

OX Safety researchers reported that the ctx.Req.URL.Path parameter could be manipulated to attain an open redirect, permitting attackers to redirect customers to exterior malicious websites whereas sustaining the looks of respectable Grafana performance. 

As soon as the malicious plugin executes, it might modify the sufferer’s account e mail tackle utilizing solely the grafana_session token, after which attackers can provoke password reset procedures to finish the account takeover.

Technical evaluation reveals that the flaw exploits path normalization weaknesses via a fastidiously crafted payload:

This string leverages the trail.Clear operate, the place /public/../ resolves to the foundation listing, whereas subsequent path traversal sequences allow redirection to attacker-controlled domains. 

The payload construction /attacker.com creates a protocol-relative URL that inherits the present web page’s protocol, successfully bypassing browser safety restrictions.

Trendy browsers usually normalize such malicious paths, however Grafana’s client-side JavaScript routing logic offers an alternate assault vector. 

By utilizing encoded path traversal sequences like /public/..%2f..%2f..%2f..%2fsomething, attackers can bypass browser normalization and set off the vulnerability via JavaScript execution. 

This subtle approach demonstrates how a number of safety layers could be circumvented via artistic exploitation strategies.

The assault’s effectiveness extends past public-facing cases, as inner Grafana deployments stay equally weak. 

Attackers can craft payloads focusing on regionally used domains and ports, making even air-gapped or network-segmented Grafana installations prone to blind assaults.

Rapid Patching Required

Organizations should instantly improve to patched Grafana variations to mitigate this important vulnerability. 

Out there safety patches embrace variations 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01. 

The vulnerability impacts a considerable portion of the estimated 128,000 Grafana cases recognized via Shodan searches.

A compromised Grafana administrator account offers attackers with full entry to inner metrics, dashboards, delicate operational information, and enterprise intelligence methods. 

Moreover, attackers can lock out respectable customers, delete accounts, and trigger vital operational disruption by eradicating entry to important monitoring infrastructure. 

Given Grafana’s widespread adoption in DevOps environments, this vulnerability poses substantial dangers to organizational safety and operational continuity, making speedy remediation important for all affected deployments.

Will the Password Supervisor Shut the Safety Hole Hackers Exploit => Test How

Cyber Security News Tags:Account, Attacks, Exposed, Grafana, Instances, Malicious, Takeover

Post navigation

Previous Post: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
Next Post: Zoomcar Says Hackers Accessed Data of 8.4 Million Users

Related Posts

Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Detect SQL Injection Vulnerabilities
  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award
  • Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
  • Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Detect SQL Injection Vulnerabilities
  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award
  • Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
  • Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News