Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41115: Vulnerability in Grafana Grafana Enterprise

0
Critical
VulnerabilityCVE-2025-41115cvecve-2025-41115
Published: Fri Nov 21 2025 (11/21/2025, 14:25:38 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: Grafana Enterprise

Description

SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in April to improve how organizations manage users and teams in Grafana by introducing automated user lifecycle management. In Grafana versions 12.x where SCIM provisioning is enabled and configured, a vulnerability in user identity handling allows a malicious or compromised SCIM client to provision a user with a numeric externalId, which in turn could allow to override internal user IDs and lead to impersonation or privilege escalation. This vulnerability applies only if all of the following conditions are met: - `enableSCIM` feature flag set to true - `user_sync_enabled` config option in the `[auth.scim]` block set to true

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:41:20 UTC

Technical Analysis

CVE-2025-41115 is a critical security vulnerability discovered in Grafana Enterprise version 12.0.0, specifically affecting the SCIM (System for Cross-domain Identity Management) provisioning feature introduced to automate user lifecycle management. The vulnerability arises from improper handling of user identity when provisioning users via SCIM. If the 'enableSCIM' feature flag is set to true and the 'user_sync_enabled' configuration option under the '[auth.scim]' block is also enabled, a malicious or compromised SCIM client can supply a numeric externalId for a user. This numeric externalId can override internal user IDs within Grafana, which are typically used to uniquely identify users internally. By exploiting this flaw, an attacker can impersonate other users or escalate privileges within the Grafana environment, potentially gaining unauthorized administrative access or access to sensitive dashboards and data. The vulnerability does not require prior authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score is 10.0, reflecting the highest severity with network attack vector, low attack complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. The underlying weakness corresponds to CWE-266 (Incorrect Privilege Assignment). Although no public exploits have been reported yet, the critical nature of the flaw demands immediate attention. This vulnerability affects only Grafana Enterprise version 12.0.0 with SCIM provisioning enabled and configured as described. No patches or mitigations were listed at the time of publication, emphasizing the need for vendor updates and configuration audits.

Potential Impact

The impact of CVE-2025-41115 is severe for organizations using Grafana Enterprise with SCIM provisioning enabled. Exploitation allows attackers to impersonate legitimate users or escalate privileges, potentially gaining administrative control over Grafana instances. This can lead to unauthorized access to sensitive monitoring dashboards, metrics, and operational data, compromising confidentiality. Integrity is at risk as attackers could modify dashboards, data sources, or alerting rules, potentially disrupting monitoring and incident response. Availability could also be affected if attackers disable or alter critical monitoring functions. Since Grafana is widely used for infrastructure and application monitoring, a successful attack could blind security teams to ongoing incidents or cause operational disruptions. The vulnerability’s remote exploitability without authentication or user interaction increases the risk of widespread attacks. Organizations relying on Grafana for critical observability and security monitoring face heightened risk of data breaches, operational downtime, and compliance violations.

Mitigation Recommendations

To mitigate CVE-2025-41115, organizations should immediately audit their Grafana Enterprise deployments to determine if SCIM provisioning is enabled and configured with 'enableSCIM' set to true and 'user_sync_enabled' enabled under '[auth.scim]'. If SCIM provisioning is not essential, consider disabling it until a vendor patch is available. If SCIM provisioning is required, restrict SCIM client access to trusted sources only and implement network-level controls such as IP whitelisting and mutual TLS authentication to prevent unauthorized SCIM client connections. Monitor Grafana logs for unusual SCIM provisioning activity, especially attempts to provision users with numeric externalIds. Apply the vendor-provided patch or update to a fixed Grafana version as soon as it is released. Additionally, implement strong role-based access controls within Grafana to limit the impact of potential privilege escalations. Regularly review user accounts and permissions for anomalies. Employ defense-in-depth by integrating Grafana with centralized identity providers that enforce multi-factor authentication and anomaly detection. Finally, maintain up-to-date backups of Grafana configurations and dashboards to enable rapid recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2025-04-16T09:19:26.442Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920778b69daa88a9a1ad75d

Added to database: 11/21/2025, 2:30:35 PM

Last enriched: 2/27/2026, 6:41:20 AM

Last updated: 3/26/2026, 7:14:03 AM

Views: 538

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses