Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11539: CWE-94 Improper Control of Generation of Code ('Code Injection') in Grafana grafana-image-renderer

0
Critical
VulnerabilityCVE-2025-11539cvecve-2025-11539cwe-94
Published: Thu Oct 09 2025 (10/09/2025, 07:18:15 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: grafana-image-renderer

Description

Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:44:15 UTC

Technical Analysis

CVE-2025-11539 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting Grafana Image Renderer versions from 1.0.0 through 4.0.16. The vulnerability stems from an arbitrary file write issue in the /render/csv HTTP endpoint, where the filePath parameter is not properly validated. This flaw allows an attacker to write a malicious shared object file to an arbitrary location on the host system. The Grafana Image Renderer uses Chromium to render images, and the malicious shared object is subsequently loaded by the Chromium process, resulting in remote code execution (RCE). Exploitation requires the attacker to have knowledge of the default or otherwise compromised authentication token (authToken) and network access to the image renderer endpoint. The CVSS v3.1 base score is 9.9, indicating critical severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and complete impact on confidentiality, integrity, and availability. The vulnerability is particularly dangerous because it allows attackers to execute arbitrary code remotely, potentially leading to full system compromise. No public exploits have been reported yet, but the high severity and ease of exploitation make it a significant threat. The vulnerability affects all deployments using the vulnerable versions with default or known tokens and exposed endpoints, emphasizing the need for immediate remediation.

Potential Impact

For European organizations, this vulnerability poses a critical risk, especially for those relying on Grafana for monitoring and visualization in their IT infrastructure. Successful exploitation can lead to full system compromise, data theft, disruption of monitoring services, and lateral movement within networks. Confidentiality is at risk as attackers can execute arbitrary code to access sensitive data. Integrity and availability are also severely impacted, as attackers can manipulate or disable monitoring systems, potentially masking other malicious activities or causing operational outages. Organizations in sectors such as finance, healthcare, energy, and government, which often use Grafana for critical infrastructure monitoring, could face severe operational and reputational damage. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal or sensitive data is exposed or systems are disrupted. The requirement for the attacker to know or guess the default token means that organizations with weak token management or exposed endpoints are particularly vulnerable. The lack of known exploits in the wild currently provides a small window for proactive defense, but the critical nature demands urgent attention.

Mitigation Recommendations

1. Immediately change the default authToken used by the Grafana Image Renderer to a strong, unique token to prevent unauthorized access. 2. Restrict network access to the /render/csv endpoint by implementing firewall rules, network segmentation, or VPN access to limit exposure only to trusted systems. 3. Monitor access logs for unusual or unauthorized attempts to access the image renderer endpoint, focusing on attempts to use the default or weak tokens. 4. Apply patches or updates from Grafana as soon as they become available; if no patch is currently available, consider disabling the image renderer service or the vulnerable endpoint temporarily. 5. Conduct a thorough audit of all Grafana deployments to identify and remediate any instances running vulnerable versions. 6. Implement runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 7. Educate administrators and DevOps teams on the importance of secure token management and endpoint exposure minimization. 8. Use network intrusion detection systems (NIDS) to detect potential exploitation attempts targeting this vulnerability. 9. Consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests to the /render/csv endpoint. 10. Regularly review and update incident response plans to include scenarios involving Grafana compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GRAFANA
Date Reserved
2025-10-09T06:20:49.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e762fe4454a62ee9978f1d

Added to database: 10/9/2025, 7:23:42 AM

Last enriched: 10/16/2025, 8:44:15 AM

Last updated: 11/20/2025, 1:43:51 PM

Views: 426

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats