CVE-2025-11539: CWE-94 Improper Control of Generation of Code ('Code Injection') in Grafana grafana-image-renderer
Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.
AI Analysis
Technical Summary
CVE-2025-11539 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting Grafana Image Renderer versions from 1.0.0 through 4.0.16. The vulnerability stems from an arbitrary file write issue in the /render/csv HTTP endpoint, where the filePath parameter is not properly validated. This flaw allows an attacker to write a malicious shared object file to an arbitrary location on the host system. The Grafana Image Renderer uses Chromium to render images, and the malicious shared object is subsequently loaded by the Chromium process, resulting in remote code execution (RCE). Exploitation requires the attacker to have knowledge of the default or otherwise compromised authentication token (authToken) and network access to the image renderer endpoint. The CVSS v3.1 base score is 9.9, indicating critical severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and complete impact on confidentiality, integrity, and availability. The vulnerability is particularly dangerous because it allows attackers to execute arbitrary code remotely, potentially leading to full system compromise. No public exploits have been reported yet, but the high severity and ease of exploitation make it a significant threat. The vulnerability affects all deployments using the vulnerable versions with default or known tokens and exposed endpoints, emphasizing the need for immediate remediation.
Potential Impact
For European organizations, this vulnerability poses a critical risk, especially for those relying on Grafana for monitoring and visualization in their IT infrastructure. Successful exploitation can lead to full system compromise, data theft, disruption of monitoring services, and lateral movement within networks. Confidentiality is at risk as attackers can execute arbitrary code to access sensitive data. Integrity and availability are also severely impacted, as attackers can manipulate or disable monitoring systems, potentially masking other malicious activities or causing operational outages. Organizations in sectors such as finance, healthcare, energy, and government, which often use Grafana for critical infrastructure monitoring, could face severe operational and reputational damage. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal or sensitive data is exposed or systems are disrupted. The requirement for the attacker to know or guess the default token means that organizations with weak token management or exposed endpoints are particularly vulnerable. The lack of known exploits in the wild currently provides a small window for proactive defense, but the critical nature demands urgent attention.
Mitigation Recommendations
1. Immediately change the default authToken used by the Grafana Image Renderer to a strong, unique token to prevent unauthorized access. 2. Restrict network access to the /render/csv endpoint by implementing firewall rules, network segmentation, or VPN access to limit exposure only to trusted systems. 3. Monitor access logs for unusual or unauthorized attempts to access the image renderer endpoint, focusing on attempts to use the default or weak tokens. 4. Apply patches or updates from Grafana as soon as they become available; if no patch is currently available, consider disabling the image renderer service or the vulnerable endpoint temporarily. 5. Conduct a thorough audit of all Grafana deployments to identify and remediate any instances running vulnerable versions. 6. Implement runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 7. Educate administrators and DevOps teams on the importance of secure token management and endpoint exposure minimization. 8. Use network intrusion detection systems (NIDS) to detect potential exploitation attempts targeting this vulnerability. 9. Consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests to the /render/csv endpoint. 10. Regularly review and update incident response plans to include scenarios involving Grafana compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-11539: CWE-94 Improper Control of Generation of Code ('Code Injection') in Grafana grafana-image-renderer
Description
Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.
AI-Powered Analysis
Technical Analysis
CVE-2025-11539 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting Grafana Image Renderer versions from 1.0.0 through 4.0.16. The vulnerability stems from an arbitrary file write issue in the /render/csv HTTP endpoint, where the filePath parameter is not properly validated. This flaw allows an attacker to write a malicious shared object file to an arbitrary location on the host system. The Grafana Image Renderer uses Chromium to render images, and the malicious shared object is subsequently loaded by the Chromium process, resulting in remote code execution (RCE). Exploitation requires the attacker to have knowledge of the default or otherwise compromised authentication token (authToken) and network access to the image renderer endpoint. The CVSS v3.1 base score is 9.9, indicating critical severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and complete impact on confidentiality, integrity, and availability. The vulnerability is particularly dangerous because it allows attackers to execute arbitrary code remotely, potentially leading to full system compromise. No public exploits have been reported yet, but the high severity and ease of exploitation make it a significant threat. The vulnerability affects all deployments using the vulnerable versions with default or known tokens and exposed endpoints, emphasizing the need for immediate remediation.
Potential Impact
For European organizations, this vulnerability poses a critical risk, especially for those relying on Grafana for monitoring and visualization in their IT infrastructure. Successful exploitation can lead to full system compromise, data theft, disruption of monitoring services, and lateral movement within networks. Confidentiality is at risk as attackers can execute arbitrary code to access sensitive data. Integrity and availability are also severely impacted, as attackers can manipulate or disable monitoring systems, potentially masking other malicious activities or causing operational outages. Organizations in sectors such as finance, healthcare, energy, and government, which often use Grafana for critical infrastructure monitoring, could face severe operational and reputational damage. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if personal or sensitive data is exposed or systems are disrupted. The requirement for the attacker to know or guess the default token means that organizations with weak token management or exposed endpoints are particularly vulnerable. The lack of known exploits in the wild currently provides a small window for proactive defense, but the critical nature demands urgent attention.
Mitigation Recommendations
1. Immediately change the default authToken used by the Grafana Image Renderer to a strong, unique token to prevent unauthorized access. 2. Restrict network access to the /render/csv endpoint by implementing firewall rules, network segmentation, or VPN access to limit exposure only to trusted systems. 3. Monitor access logs for unusual or unauthorized attempts to access the image renderer endpoint, focusing on attempts to use the default or weak tokens. 4. Apply patches or updates from Grafana as soon as they become available; if no patch is currently available, consider disabling the image renderer service or the vulnerable endpoint temporarily. 5. Conduct a thorough audit of all Grafana deployments to identify and remediate any instances running vulnerable versions. 6. Implement runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. 7. Educate administrators and DevOps teams on the importance of secure token management and endpoint exposure minimization. 8. Use network intrusion detection systems (NIDS) to detect potential exploitation attempts targeting this vulnerability. 9. Consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests to the /render/csv endpoint. 10. Regularly review and update incident response plans to include scenarios involving Grafana compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GRAFANA
- Date Reserved
- 2025-10-09T06:20:49.088Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e762fe4454a62ee9978f1d
Added to database: 10/9/2025, 7:23:42 AM
Last enriched: 10/16/2025, 8:44:15 AM
Last updated: 11/20/2025, 1:43:51 PM
Views: 426
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13468: Missing Authorization in SourceCodester Alumni Management System
MediumCVE-2025-0643: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Narkom Communication and Software Technologies Trade Ltd. Co. Pyxis Signage
HighCVE-2025-40601: CWE-121 Stack-based Buffer Overflow in SonicWall SonicOS
UnknownCVE-2025-40605: CWE-23 Relative Path Traversal in SonicWall Email Security
UnknownCVE-2025-40604: CWE-494 Download of Code Without Integrity Check in SonicWall Email Security
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.