Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

Posted on July 20, 2025July 20, 2025 By CWS

Two vital Grafana vulnerabilities that might permit attackers to redirect customers to malicious web sites and execute arbitrary JavaScript code. 

The vulnerabilities, recognized as CVE-2025-6023 and CVE-2025-6197, have an effect on a number of variations of Grafana, together with 12.0.x, 11.6.x, 11.5.x, 11.4.x, and 11.3.x branches. 

Each safety flaws have been found by means of Grafana’s bug bounty program, with researchers Hoa X. Nguyen from OPSWAT and Dat Phung answerable for the respective discoveries.

Key Takeaways1. CVE-2025-6023 (XSS) and CVE-2025-6197 (redirect) in Grafana variations have been patched2. Attackers can redirect customers and execute malicious code.3. Improve instantly or apply Content material Safety Coverage mitigations.

Excessive-Severity XSS Vulnerability 

The extra critical vulnerability, CVE-2025-6023, carries a CVSS rating of seven.6 and represents a high-severity cross-site scripting (XSS) assault vector. 

This vulnerability exploits shopper path traversal and open redirect mechanisms, enabling attackers to redirect customers to malicious web sites that may execute arbitrary JavaScript code inside scripted dashboards. 

What makes this vulnerability significantly harmful is that it doesn’t require editor permissions to use, and if nameless entry is enabled, the XSS assault turns into instantly viable.

The vulnerability impacts Grafana variations >= 11.5.0 and poses vital dangers to Grafana Cloud customers since their Content material-Safety-Coverage lacks a connect-src directive, which is important for stopping attackers from fetching exterior JavaScript. 

Whereas attackers don’t want direct entry to craft payloads, victims have to be authenticated with at the very least Viewer permissions for profitable JavaScript execution. 

The potential impression consists of session hijacking and full account takeover by means of malicious script execution.

Medium-Severity Open Redirect Flaw 

CVE-2025-6197, with a CVSS rating of 4.2, represents a medium-severity open redirect vulnerability inside Grafana’s group switching performance. 

This vulnerability requires particular situations for exploitation: the Grafana occasion should help a number of organizations, the focused consumer have to be a member of each organizations being switched between, and the attacker should possess information of the group ID at the moment being seen.

Notably, Grafana Cloud customers stay unaffected by this explicit vulnerability for the reason that platform doesn’t help Organizations. 

Nevertheless, the open redirect mechanism can probably be chained with different assaults to attain XSS, just like the patterns noticed in CVE-2025-6023 and the earlier vulnerability CVE-2025-4123.

CVETitleAffected VersionsPatched VersionsCVSS 3.1 ScoreSeverityCVE-2025-6023XSS by way of shopper path traversal and open redirect>= Grafana 11.5.012.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, 11.3.8+security-017.6HighCVE-2025-6197Open redirect by way of group switching>= Grafana 11.5.012.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, 11.3.8+security-014.2Medium

Patches Obtainable 

Grafana Labs has launched complete safety patches throughout all affected variations, together with Grafana 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, and 11.3.8+security-01. 

For organizations unable to right away improve, non permanent mitigation methods can be found.

For CVE-2025-6023, directors can implement Content material Safety Coverage configurations utilizing the next template:

For CVE-2025-6197, directors can block Grafana URLs starting with / (%2Fpercent5C) of their ingress configuration or restrict cases to single group deployments.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Code, Dashboards, Execution, Grafana, Malicious, Redirection, Sites, User, Vulnerabilities

Post navigation

Previous Post: SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access
Next Post: Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

Related Posts

Web-to-App Funnels: Pros And Cons Cyber Security News
McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data Cyber Security News
Microsoft Patch Tuesday August 2025 Released Cyber Security News
Free Decryptor Released for AI-Assisted FunkSec Ransomware Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
  • Sendmarc appoints Rob Bowker as North American Region Lead
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Seeks Researchers for 2026 iPhone Security Program
  • NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
  • Sendmarc appoints Rob Bowker as North American Region Lead
  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News