Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Grafana Vulnerability Let Attackers Escalate Privilege

Posted on November 21, 2025November 21, 2025 By CWS

Grafana Labs has disclosed a vital safety vulnerability affecting Grafana Enterprise that would permit attackers to escalate privileges and impersonate customers.

The flaw, tracked as CVE-2025-41115, has acquired the utmost CVSS rating of 10.0, making it one of the crucial extreme vulnerabilities found in current occasions.

The vulnerability exists in Grafana’s SCIM (System for Cross-domain Id Administration) setup characteristic, which was launched in April 2025 to assist organizations automate consumer lifecycle administration.

The problem impacts Grafana Enterprise variations 12.0.0 by way of 12.2.1, the place SCIM setup is enabled and configured.

In accordance with Grafana Labs, the vulnerability stems from incorrect dealing with of consumer identities. A malicious or compromised SCIM shopper may provision a consumer with a numeric externalId, probably overriding inner consumer IDs.

AttributeDetailsCVE IDCVE-2025-41115Vulnerability TypeIncorrect Privilege Task / Person ImpersonationCVSS Score10.0SeverityCriticalAffected ProductsGrafana Enterprise (with SCIM provisioning enabled)Affected VersionsGrafana Enterprise 12.0.0 to 12.2.1

This might permit attackers to impersonate current customers, together with directors, main to finish system compromise.

The flaw impacts solely programs the place each the enableSCIM characteristic flag and the user_sync_enabled configuration choice are set to true. This vulnerability doesn’t influence Grafana OSS customers.

Grafana Labs found the vulnerability throughout inner safety audits on November 4, 2025, and instantly declared an inner incident.

The corporate confirmed no exploitation occurred in Grafana Cloud environments and launched patches inside days.

Organizations working affected variations ought to improve instantly to patched variations, together with Grafana Enterprise 12.3.0, 12.2.1, 12.1.3, or 12.0.6.

Grafana Cloud clients and managed service customers on Amazon and Azure platforms have already acquired automated safety updates.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Critical, Escalate, Grafana, Privilege, Vulnerability

Post navigation

Previous Post: Why IT Admins Choose Samsung for Mobile Security
Next Post: Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack

Related Posts

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Cyber Security News
What Businesses Need to Know Cyber Security News
Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
Critical n8n Automation Platform Vulnerability Enables RCE Attacks Cyber Security News
Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark