CVE-2025-41117: Vulnerability in Grafana grafana/grafana
Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.
AI Analysis
Technical Summary
CVE-2025-41117 is a reflected cross-site scripting (XSS) vulnerability identified in Grafana's Explore Traces feature specifically when interfacing with datasources that use the Jaeger HTTP API. Grafana versions 12.2.0 and 12.3.0 render stack traces as raw HTML in the browser without proper sanitization, allowing an attacker who can inject malicious JavaScript into the stack trace field to execute arbitrary scripts in the context of the victim's browser. This vulnerability stems from improper output encoding and input validation, classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The attack requires the attacker to supply malicious JavaScript within the stack trace data, which then gets rendered and executed when a user views the Explore Traces page. The vulnerability does not affect other Jaeger datasource protocols such as gRPC or Tempo, limiting the scope to Jaeger HTTP API users. The CVSS 3.1 score of 6.8 reflects a network-based attack vector with high impact on confidentiality and integrity, but with high attack complexity and requiring user interaction, as the victim must view the malicious trace data. No public exploits have been reported, but the vulnerability poses a risk of session hijacking, data theft, or other malicious actions via script execution in the victim's browser.
Potential Impact
This vulnerability can lead to unauthorized disclosure of sensitive information, session hijacking, or manipulation of the Grafana user interface through malicious JavaScript execution. Organizations relying on Grafana with Jaeger HTTP API datasources are at risk of attackers injecting malicious scripts into stack traces, potentially compromising user accounts and sensitive monitoring data. The impact is particularly significant for organizations that use Grafana for critical infrastructure monitoring, as attackers could leverage this to gain further footholds or disrupt operations. Although exploitation requires user interaction and high attack complexity, the widespread use of Grafana in enterprise environments means the potential attack surface is large. The vulnerability does not affect availability but threatens confidentiality and integrity of data and user sessions.
Mitigation Recommendations
Organizations should upgrade Grafana to a version where this vulnerability is patched once available. Until patches are released, administrators should restrict access to the Explore Traces feature and limit datasource usage to trusted sources. Input validation and output encoding controls should be enforced on stack trace data to prevent raw HTML rendering. Monitoring and alerting for suspicious trace data inputs can help detect attempted exploitation. Additionally, applying Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting script execution sources. Educating users to avoid interacting with untrusted trace data and disabling or restricting the Jaeger HTTP API datasource where feasible can reduce risk. Regularly reviewing Grafana configurations and logs for anomalies related to trace data injection is also recommended.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Canada, Australia, Netherlands, Sweden, India
CVE-2025-41117: Vulnerability in Grafana grafana/grafana
Description
Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.
AI-Powered Analysis
Technical Analysis
CVE-2025-41117 is a reflected cross-site scripting (XSS) vulnerability identified in Grafana's Explore Traces feature specifically when interfacing with datasources that use the Jaeger HTTP API. Grafana versions 12.2.0 and 12.3.0 render stack traces as raw HTML in the browser without proper sanitization, allowing an attacker who can inject malicious JavaScript into the stack trace field to execute arbitrary scripts in the context of the victim's browser. This vulnerability stems from improper output encoding and input validation, classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The attack requires the attacker to supply malicious JavaScript within the stack trace data, which then gets rendered and executed when a user views the Explore Traces page. The vulnerability does not affect other Jaeger datasource protocols such as gRPC or Tempo, limiting the scope to Jaeger HTTP API users. The CVSS 3.1 score of 6.8 reflects a network-based attack vector with high impact on confidentiality and integrity, but with high attack complexity and requiring user interaction, as the victim must view the malicious trace data. No public exploits have been reported, but the vulnerability poses a risk of session hijacking, data theft, or other malicious actions via script execution in the victim's browser.
Potential Impact
This vulnerability can lead to unauthorized disclosure of sensitive information, session hijacking, or manipulation of the Grafana user interface through malicious JavaScript execution. Organizations relying on Grafana with Jaeger HTTP API datasources are at risk of attackers injecting malicious scripts into stack traces, potentially compromising user accounts and sensitive monitoring data. The impact is particularly significant for organizations that use Grafana for critical infrastructure monitoring, as attackers could leverage this to gain further footholds or disrupt operations. Although exploitation requires user interaction and high attack complexity, the widespread use of Grafana in enterprise environments means the potential attack surface is large. The vulnerability does not affect availability but threatens confidentiality and integrity of data and user sessions.
Mitigation Recommendations
Organizations should upgrade Grafana to a version where this vulnerability is patched once available. Until patches are released, administrators should restrict access to the Explore Traces feature and limit datasource usage to trusted sources. Input validation and output encoding controls should be enforced on stack trace data to prevent raw HTML rendering. Monitoring and alerting for suspicious trace data inputs can help detect attempted exploitation. Additionally, applying Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting script execution sources. Educating users to avoid interacting with untrusted trace data and disabling or restricting the Jaeger HTTP API datasource where feasible can reduce risk. Regularly reviewing Grafana configurations and logs for anomalies related to trace data injection is also recommended.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GRAFANA
- Date Reserved
- 2025-04-16T09:19:26.443Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698d9b14c9e1ff5ad8b1f9ec
Added to database: 2/12/2026, 9:19:16 AM
Last enriched: 2/26/2026, 11:11:51 PM
Last updated: 3/11/2026, 11:05:17 PM
Views: 142
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.