Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

Posted on November 21, 2025November 21, 2025 By CWS

Nov 21, 2025Ravie LakshmananVulnerability / Risk Mitigation
Grafana has launched safety updates to deal with a most severity safety flaw that would permit privilege escalation or consumer impersonation below sure configurations.
The vulnerability, tracked as CVE-2025-41115, carries a CVSS rating of 10.0. It resides within the System for Cross-domain Id Administration (SCIM) part that enables automated consumer provisioning and administration. First launched in April 2025, it is at present in public preview.
“In Grafana variations 12.x the place SCIM provisioning is enabled and configured, a vulnerability in consumer id dealing with permits a malicious or compromised SCIM consumer to provision a consumer with a numeric externalId, which in flip might permit for overriding inner consumer IDs and result in impersonation or privilege escalation,” Grafana’s Vardan Torosyan stated.

That stated, profitable exploitation hinges on each situations being met –

enableSCIM characteristic flag is about to true
user_sync_enabled config choice within the [auth.scim] block is about to true

The shortcoming impacts Grafana Enterprise variations from 12.0.0 to 12.2.1. It has been addressed within the following variations of the software program –

Grafana Enterprise 12.0.6+security-01
Grafana Enterprise 12.1.3+security-01
Grafana Enterprise 12.2.1+security-01
Grafana Enterprise 12.3.0

“Grafana maps the SCIM externalId on to the interior consumer.uid; due to this fact, numeric values (e.g. ‘1’) could also be interpreted as inner numeric consumer IDs,” Torosyan stated. “In particular circumstances this might permit the newly provisioned consumer to be handled as an present inner account, such because the Admin, resulting in potential impersonation or privilege escalation.”
The analytics and observability platform stated the vulnerability was found internally on November 4, 2025, throughout an audit and testing. Given the severity of the difficulty, customers are suggested to use the patches as quickly as potential to mitigate potential dangers.

The Hacker News Tags:CVSS, Enabling, Escalation, Flaw, Grafana, Impersonation, Patches, Privilege, SCIM

Post navigation

Previous Post: Ransomware Actors Primarily Targeting Retailers This Holiday Season to Deploy Malicious Payloads
Next Post: Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware

Related Posts

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes The Hacker News
The Silent Drivers Behind 2025’s Worst Breaches The Hacker News
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters The Hacker News
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support The Hacker News
Enterprise Credentials at Risk – Same Old, Same Old? The Hacker News
FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark