Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11539: CWE-94 Improper Control of Generation of Code ('Code Injection') in Grafana grafana-image-renderer

0
Critical
VulnerabilityCVE-2025-11539cvecve-2025-11539cwe-94
Published: Thu Oct 09 2025 (10/09/2025, 07:18:15 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: grafana-image-renderer

Description

Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:13:23 UTC

Technical Analysis

CVE-2025-11539 is a critical vulnerability in the Grafana Image Renderer component, specifically affecting versions from 1.0.0 through 4.0.16. The flaw is due to improper validation of the filePath parameter in the /render/csv HTTP endpoint, which allows an attacker to perform arbitrary file writes. This vulnerability is classified under CWE-94 (Improper Control of Generation of Code, or Code Injection). The attack vector involves an attacker sending a crafted request to the /render/csv endpoint with a manipulated filePath parameter, enabling them to write a malicious shared object (.so file) to an arbitrary location on the server. Subsequently, the Chromium process used by the renderer loads this malicious shared object, resulting in remote code execution (RCE). Exploitation requires that the attacker can reach the image renderer endpoint and possesses the default or otherwise known authentication token (authToken), which is used for access control. The vulnerability has a CVSS v3.1 base score of 9.9, reflecting its critical nature with network attack vector, low attack complexity, privileges required, no user interaction, and complete compromise of confidentiality, integrity, and availability. Although no known exploits are publicly reported, the severity and ease of exploitation make this a high-risk issue. The flaw affects the core rendering functionality of Grafana deployments that utilize the image renderer for generating visual content, potentially allowing attackers to execute arbitrary code on the host system running the renderer service.

Potential Impact

The impact of CVE-2025-11539 is severe for organizations using Grafana with the vulnerable image renderer component. Successful exploitation leads to remote code execution on the host system, allowing attackers to fully compromise the affected server. This can result in unauthorized data access, data manipulation, service disruption, lateral movement within networks, and deployment of persistent malware or ransomware. Since Grafana is widely used for monitoring and visualization in IT infrastructure, industrial control systems, and cloud environments, attackers gaining control over the renderer host could undermine the integrity and availability of monitoring data, potentially blinding security operations and incident response teams. The vulnerability’s reliance on the default or known authToken means that organizations failing to change default credentials are at heightened risk. Additionally, if the image renderer endpoint is exposed to untrusted networks, the attack surface expands significantly. The critical nature of this vulnerability demands immediate attention to prevent potential breaches and operational disruptions.

Mitigation Recommendations

To mitigate CVE-2025-11539, organizations should take the following specific actions: 1) Immediately change the default authToken used by the grafana-image-renderer to a strong, unique token to prevent unauthorized access. 2) Restrict network access to the /render/csv endpoint by implementing network segmentation, firewall rules, or VPN access to limit exposure to trusted users only. 3) Monitor and audit access logs for any suspicious or unauthorized requests to the image renderer endpoints. 4) Upgrade grafana-image-renderer to a patched version once available from the vendor; if no patch is currently released, consider disabling the image renderer component temporarily if feasible. 5) Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 6) Conduct internal penetration testing focusing on the image renderer endpoints to verify that mitigations are effective. 7) Educate administrators about the risks of default credentials and enforce credential management policies. These steps go beyond generic advice by focusing on access control hardening, proactive monitoring, and immediate credential changes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GRAFANA
Date Reserved
2025-10-09T06:20:49.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e762fe4454a62ee9978f1d

Added to database: 10/9/2025, 7:23:42 AM

Last enriched: 2/26/2026, 10:13:23 PM

Last updated: 3/22/2026, 10:19:40 PM

Views: 628

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses