Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41116: CWE-653 in Grafana Labs Grafana Databricks Datasource Plugin

0
Low
VulnerabilityCVE-2025-41116cvecve-2025-41116cwe-653
Published: Tue Nov 11 2025 (11/11/2025, 20:18:07 UTC)
Source: CVE Database V5
Vendor/Project: Grafana Labs
Product: Grafana Databricks Datasource Plugin

Description

When using the Grafana Databricks Datasource Plugin, if Oauth passthrough is enabled on the datasource, and multiple users are using the same datasource at the same time on a single Grafana instance, it  could result in  the wrong user identifier being used, and information for which the viewer is not authorized being returned.  This issue affects Grafana Databricks Datasource Plugin: from 1.12.1 before 1.12.0

AI-Powered Analysis

AILast updated: 11/11/2025, 21:13:21 UTC

Technical Analysis

CVE-2025-41116 is a vulnerability identified in the Grafana Databricks Datasource Plugin, specifically affecting versions from 1.6.0 up to but not including 1.12.0. The root cause is a logic flaw related to OAuth passthrough authentication when multiple users concurrently access the same datasource on a single Grafana instance. Under these conditions, the plugin may incorrectly associate user identifiers, resulting in the return of data belonging to a different user than the one currently viewing the dashboard. This behavior violates access control principles and can lead to unauthorized data disclosure. The vulnerability is categorized as CWE-653, which involves improper use of a security mechanism—in this case, OAuth passthrough. The CVSS 4.0 base score is 2.1, reflecting a low severity due to the requirement of low privileges, user interaction, and limited impact scope. No integrity or availability impacts are reported, and no known exploits exist in the wild as of the publication date. The issue primarily affects confidentiality by exposing data to unauthorized users within the same Grafana instance. The vulnerability was reserved in April 2025 and published in November 2025, with no patch links provided yet, indicating that remediation may require vendor updates or configuration changes.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data disclosure within Grafana dashboards that use the Databricks Datasource Plugin with OAuth passthrough enabled. Organizations relying on Grafana for data visualization and analytics, especially those integrating Databricks for big data processing, could inadvertently expose sensitive or regulated information to unauthorized users within the same instance. This is particularly concerning for sectors handling personal data under GDPR, financial data, or intellectual property. While the severity is low, the breach of confidentiality could lead to compliance violations, reputational damage, and potential legal consequences. The impact is limited to multi-user environments sharing datasources with OAuth passthrough enabled, so single-user or differently configured setups are less affected. Since no known exploits exist, the immediate threat is low, but the vulnerability could be exploited if attackers gain low-level access and user interaction is feasible. The limited scope and low CVSS score suggest the impact is contained but still relevant for organizations with strict data access controls.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately audit Grafana instances to identify versions of the Databricks Datasource Plugin in use, focusing on versions from 1.6.0 up to before 1.12.0. 2) Disable OAuth passthrough on affected datasources if possible, or segregate datasources per user to avoid multi-user sharing scenarios that trigger the vulnerability. 3) Monitor and restrict user privileges on Grafana instances to limit the number of users sharing datasources concurrently. 4) Apply vendor patches or updates as soon as they become available; if no patch is currently available, engage with Grafana Labs support for interim fixes or workarounds. 5) Implement strict access controls and logging to detect any anomalous data access patterns within Grafana dashboards. 6) Educate users about the risk of unauthorized data exposure in shared environments and enforce policies to minimize concurrent multi-user datasource usage. 7) Consider network segmentation and additional authentication layers around Grafana instances to reduce the risk of unauthorized access. These measures go beyond generic advice by focusing on configuration changes and operational controls tailored to the vulnerability's exploitation conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2025-04-16T09:19:26.443Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6913a6d6768d655a7be0441c

Added to database: 11/11/2025, 9:12:54 PM

Last enriched: 11/11/2025, 9:13:21 PM

Last updated: 11/11/2025, 11:44:38 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats