Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41116: CWE-653 in Grafana Labs Grafana Databricks Datasource Plugin

0
Low
VulnerabilityCVE-2025-41116cvecve-2025-41116cwe-653
Published: Tue Nov 11 2025 (11/11/2025, 20:18:07 UTC)
Source: CVE Database V5
Vendor/Project: Grafana Labs
Product: Grafana Databricks Datasource Plugin

Description

When using the Grafana Databricks Datasource Plugin, if Oauth passthrough is enabled on the datasource, and multiple users are using the same datasource at the same time on a single Grafana instance, it  could result in  the wrong user identifier being used, and information for which the viewer is not authorized being returned.  This issue affects Grafana Databricks Datasource Plugin: from 1.6.0 before 1.12.0

AI-Powered Analysis

AILast updated: 11/25/2025, 23:16:04 UTC

Technical Analysis

CVE-2025-41116 is a vulnerability classified under CWE-653 (Insufficient Control of a Resource Through its Lifetime) affecting the Grafana Databricks Datasource Plugin versions 1.6.0 up to but not including 1.12.0. The flaw arises specifically when OAuth passthrough is enabled on the datasource and multiple users concurrently access the same datasource on a single Grafana instance. Under these conditions, the plugin may incorrectly associate user identifiers, resulting in the return of data belonging to a different user. This misattribution occurs due to improper session or token management within the plugin, leading to potential unauthorized data disclosure. The vulnerability impacts confidentiality but does not affect integrity or availability. Exploitation requires at least low privileges (authenticated user) and user interaction, such as accessing the datasource simultaneously with others. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial authentication, and user interaction required, with no impact on confidentiality, integrity, or availability metrics. No public exploits are known, and no patches are linked yet, but upgrading to version 1.12.0 or later is implied as a remediation step. This vulnerability is particularly relevant for environments where multiple users share datasources with OAuth passthrough enabled, a common scenario in enterprise Grafana deployments integrating with Databricks for data visualization.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive data visualized through Grafana dashboards connected to Databricks via the vulnerable plugin. This could lead to leakage of business intelligence, personal data, or other confidential information, potentially violating GDPR and other data protection regulations. The risk is heightened in multi-tenant or shared Grafana environments common in large enterprises or managed service providers. Although the severity is low, the breach of confidentiality can damage trust, lead to compliance penalties, and expose organizations to insider threat risks. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the ease of exploitation is moderate due to the need for authenticated users and specific configuration, limiting the scope to internal or trusted users with access to the Grafana instance. European organizations using Grafana for critical analytics or regulated data should prioritize addressing this vulnerability to prevent inadvertent data exposure.

Mitigation Recommendations

1. Upgrade the Grafana Databricks Datasource Plugin to version 1.12.0 or later where the vulnerability is fixed. 2. If immediate upgrade is not possible, disable OAuth passthrough on the affected datasource to prevent user identifier mix-ups. 3. Implement strict access controls and user segregation in Grafana to minimize concurrent access to shared datasources. 4. Monitor Grafana logs for unusual access patterns or data requests that could indicate exploitation attempts. 5. Review and audit datasource configurations regularly to ensure compliance with least privilege principles. 6. Educate users about the risk of concurrent datasource usage and encourage session isolation practices. 7. Coordinate with Grafana Labs for official patches or updates and subscribe to their security advisories. 8. Consider network segmentation or additional authentication layers around Grafana instances to reduce exposure. These steps go beyond generic advice by focusing on configuration changes, user behavior, and monitoring specific to this vulnerability scenario.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2025-04-16T09:19:26.443Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6913a6d6768d655a7be0441c

Added to database: 11/11/2025, 9:12:54 PM

Last enriched: 11/25/2025, 11:16:04 PM

Last updated: 12/26/2025, 8:24:42 PM

Views: 149

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats