Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41115: Vulnerability in Grafana Grafana Enterprise

0
Critical
VulnerabilityCVE-2025-41115cvecve-2025-41115
Published: Fri Nov 21 2025 (11/21/2025, 14:25:38 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: Grafana Enterprise

Description

SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in April to improve how organizations manage users and teams in Grafana by introducing automated user lifecycle management. In Grafana versions 12.x where SCIM provisioning is enabled and configured, a vulnerability in user identity handling allows a malicious or compromised SCIM client to provision a user with a numeric externalId, which in turn could allow to override internal user IDs and lead to impersonation or privilege escalation. This vulnerability applies only if all of the following conditions are met: - `enableSCIM` feature flag set to true - `user_sync_enabled` config option in the `[auth.scim]` block set to true

AI-Powered Analysis

AILast updated: 11/28/2025, 22:51:15 UTC

Technical Analysis

CVE-2025-41115 is a critical security vulnerability identified in Grafana Enterprise version 12.0.0, specifically affecting the SCIM (System for Cross-domain Identity Management) provisioning feature introduced to automate user lifecycle management. The vulnerability arises from improper handling of user identity data when SCIM provisioning is enabled and configured with both the 'enableSCIM' feature flag set to true and the 'user_sync_enabled' option enabled in the '[auth.scim]' configuration block. A malicious or compromised SCIM client can exploit this flaw by provisioning a user with a numeric externalId value. This numeric externalId can override internal user IDs within Grafana, which are typically used to uniquely identify and authorize users. By doing so, the attacker can impersonate existing users or escalate privileges, potentially gaining administrative control or unauthorized access to sensitive dashboards and data. The vulnerability is exploitable remotely without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 10.0 reflects the highest severity, indicating critical impact on confidentiality, integrity, and availability, and a wide attack surface. The underlying weakness corresponds to CWE-266, which involves improper access control or authorization logic. Although no known exploits are reported in the wild yet, the severity and ease of exploitation necessitate urgent attention from affected organizations.

Potential Impact

For European organizations, the impact of this vulnerability is significant. Grafana is widely used across various sectors including finance, manufacturing, energy, and public services for monitoring and visualization of critical infrastructure and business metrics. Exploitation could lead to unauthorized access to sensitive operational data, manipulation of monitoring dashboards, and disruption of incident response capabilities. This could result in data breaches, operational downtime, and loss of trust. Organizations relying on automated user provisioning via SCIM are particularly vulnerable, as attackers could silently escalate privileges or impersonate users without detection. The critical nature of the vulnerability means that exploitation could compromise entire Grafana environments, affecting confidentiality, integrity, and availability of monitoring data crucial for decision-making and security operations.

Mitigation Recommendations

Immediate mitigation steps include disabling the SCIM provisioning feature by setting the 'enableSCIM' flag to false or disabling 'user_sync_enabled' in the '[auth.scim]' configuration block until a vendor patch is available. Organizations should audit their current Grafana configurations to identify if SCIM provisioning is enabled and review user provisioning logs for suspicious activity. Implement strict access controls on SCIM clients and restrict provisioning capabilities to trusted entities only. Monitor Grafana logs for anomalous user creation or modification events. Once Grafana releases an official patch addressing CVE-2025-41115, apply it promptly. Additionally, consider implementing multi-factor authentication (MFA) for Grafana access and integrate Grafana with centralized identity providers that enforce strong authentication and authorization policies. Regularly update Grafana to the latest versions and subscribe to vendor security advisories to stay informed about new vulnerabilities and fixes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2025-04-16T09:19:26.442Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920778b69daa88a9a1ad75d

Added to database: 11/21/2025, 2:30:35 PM

Last enriched: 11/28/2025, 10:51:15 PM

Last updated: 1/7/2026, 6:08:56 AM

Views: 400

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats