Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41117: Vulnerability in Grafana grafana/grafana

0
Medium
VulnerabilityCVE-2025-41117cvecve-2025-41117
Published: Thu Feb 12 2026 (02/12/2026, 08:49:08 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: grafana/grafana

Description

Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:15:18 UTC

Technical Analysis

CVE-2025-41117 is a stored cross-site scripting (XSS) vulnerability identified in Grafana's Explore Traces feature specifically when interfacing with datasources that use the Jaeger HTTP API. The vulnerability arises because stack traces are rendered as raw HTML without proper sanitization, allowing an attacker to inject malicious JavaScript code into the stack trace fields. When a user views the affected trace in the Grafana UI, the malicious script executes in their browser context, potentially leading to session hijacking, data theft, or unauthorized actions within the Grafana environment. This issue is limited to Grafana versions 12.2.0 and 12.3.0 and does not affect other Jaeger datasource protocols such as gRPC or Tempo. Exploitation requires an attacker to insert malicious JavaScript into the stack trace data, which then requires a user to interact with the Explore Traces view to trigger the payload. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The CVSS v3.1 base score is 6.8, reflecting a network attack vector, high attack complexity, no privileges required, user interaction needed, and high impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, and no official patches are linked at this time. The vulnerability was reserved in April 2025 and published in February 2026.

Potential Impact

This vulnerability can lead to unauthorized execution of JavaScript in the context of the Grafana web application, compromising the confidentiality and integrity of data displayed or managed through Grafana. Attackers could steal session cookies, perform actions on behalf of authenticated users, or exfiltrate sensitive monitoring and tracing data. Since Grafana is widely used for observability and monitoring in enterprise environments, exploitation could expose critical infrastructure insights or credentials. The requirement for user interaction and the need for malicious input in stack traces somewhat limit the attack surface, but targeted attacks against organizations using the Jaeger HTTP API datasource remain a concern. The lack of impact on availability reduces the risk of denial-of-service scenarios. Overall, the vulnerability poses a moderate risk to organizations relying on affected Grafana versions for trace visualization, especially those with high-value telemetry data.

Mitigation Recommendations

Organizations should upgrade Grafana to versions beyond 12.3.0 once patches become available to fully remediate the vulnerability. Until patches are released, administrators should restrict access to the Explore Traces view and limit datasource usage to those not using the Jaeger HTTP API, such as Jaeger gRPC or Tempo. Input validation or sanitization on stack trace data before rendering should be implemented if possible. Employ Content Security Policy (CSP) headers to restrict script execution and reduce the impact of XSS attacks. Monitor logs for suspicious stack trace entries containing script tags or unusual payloads. Educate users to avoid interacting with untrusted or suspicious trace data. Additionally, consider isolating Grafana instances or using network segmentation to limit exposure. Regularly review Grafana configurations and datasource integrations to minimize attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2025-04-16T09:19:26.443Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698d9b14c9e1ff5ad8b1f9ec

Added to database: 2/12/2026, 9:19:16 AM

Last enriched: 3/27/2026, 6:15:18 PM

Last updated: 3/29/2026, 4:38:58 AM

Views: 165

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses