Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41117: Vulnerability in Grafana grafana/grafana

0
Medium
VulnerabilityCVE-2025-41117cvecve-2025-41117
Published: Thu Feb 12 2026 (02/12/2026, 08:49:08 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: grafana/grafana

Description

Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.

AI-Powered Analysis

AILast updated: 02/26/2026, 23:11:51 UTC

Technical Analysis

CVE-2025-41117 is a reflected cross-site scripting (XSS) vulnerability identified in Grafana's Explore Traces feature specifically when interfacing with datasources that use the Jaeger HTTP API. Grafana versions 12.2.0 and 12.3.0 render stack traces as raw HTML in the browser without proper sanitization, allowing an attacker who can inject malicious JavaScript into the stack trace field to execute arbitrary scripts in the context of the victim's browser. This vulnerability stems from improper output encoding and input validation, classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The attack requires the attacker to supply malicious JavaScript within the stack trace data, which then gets rendered and executed when a user views the Explore Traces page. The vulnerability does not affect other Jaeger datasource protocols such as gRPC or Tempo, limiting the scope to Jaeger HTTP API users. The CVSS 3.1 score of 6.8 reflects a network-based attack vector with high impact on confidentiality and integrity, but with high attack complexity and requiring user interaction, as the victim must view the malicious trace data. No public exploits have been reported, but the vulnerability poses a risk of session hijacking, data theft, or other malicious actions via script execution in the victim's browser.

Potential Impact

This vulnerability can lead to unauthorized disclosure of sensitive information, session hijacking, or manipulation of the Grafana user interface through malicious JavaScript execution. Organizations relying on Grafana with Jaeger HTTP API datasources are at risk of attackers injecting malicious scripts into stack traces, potentially compromising user accounts and sensitive monitoring data. The impact is particularly significant for organizations that use Grafana for critical infrastructure monitoring, as attackers could leverage this to gain further footholds or disrupt operations. Although exploitation requires user interaction and high attack complexity, the widespread use of Grafana in enterprise environments means the potential attack surface is large. The vulnerability does not affect availability but threatens confidentiality and integrity of data and user sessions.

Mitigation Recommendations

Organizations should upgrade Grafana to a version where this vulnerability is patched once available. Until patches are released, administrators should restrict access to the Explore Traces feature and limit datasource usage to trusted sources. Input validation and output encoding controls should be enforced on stack trace data to prevent raw HTML rendering. Monitoring and alerting for suspicious trace data inputs can help detect attempted exploitation. Additionally, applying Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting script execution sources. Educating users to avoid interacting with untrusted trace data and disabling or restricting the Jaeger HTTP API datasource where feasible can reduce risk. Regularly reviewing Grafana configurations and logs for anomalies related to trace data injection is also recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2025-04-16T09:19:26.443Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698d9b14c9e1ff5ad8b1f9ec

Added to database: 2/12/2026, 9:19:16 AM

Last enriched: 2/26/2026, 11:11:51 PM

Last updated: 3/11/2026, 11:05:17 PM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses