CVE-2025-41117: Vulnerability in Grafana grafana/grafana
CVE-2025-41117 is a medium-severity vulnerability in Grafana versions 12. 2. 0 and 12. 3. 0 affecting the Explore Traces view when using datasources with the Jaeger HTTP API. The vulnerability allows malicious JavaScript injection via stack traces rendered as raw HTML, potentially leading to cross-site scripting (XSS) attacks. Exploitation requires an attacker to input malicious JavaScript into the stack trace field and user interaction to trigger the payload. Jaeger gRPC and Tempo datasources are not affected. No known exploits are currently in the wild. The vulnerability impacts confidentiality and integrity but not availability.
AI Analysis
Technical Summary
CVE-2025-41117 is a vulnerability identified in Grafana versions 12.2.0 and 12.3.0 that affects the Explore Traces feature when used with datasources leveraging the Jaeger HTTP API. The core issue lies in the way stack traces are rendered: they are displayed as raw HTML without proper sanitization, allowing malicious JavaScript code embedded within the stack trace field to execute in the user's browser. This constitutes a cross-site scripting (XSS) vulnerability. The attack vector requires an attacker to inject JavaScript into the stack trace data, which is then rendered in the Explore Traces view. Notably, this vulnerability does not affect Jaeger gRPC or Tempo datasources, limiting the scope to Jaeger HTTP API users. The CVSS v3.1 score is 6.8, reflecting a medium severity due to network attack vector, high impact on confidentiality and integrity, but requiring user interaction and high attack complexity. No known exploits have been reported in the wild, indicating limited active exploitation at this time. The vulnerability could allow attackers to steal session tokens, perform actions on behalf of users, or conduct phishing attacks within the Grafana interface. Since Grafana is widely used for monitoring and observability, the compromise of its interface could lead to significant information disclosure and manipulation risks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of monitoring data and user sessions within Grafana dashboards. Attackers exploiting this XSS flaw could hijack user sessions, steal sensitive monitoring data, or execute malicious actions within the Grafana environment. This is particularly critical for organizations relying on Grafana for infrastructure monitoring, application performance, and security analytics, as compromised dashboards could lead to misinformation or unauthorized access to operational insights. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. Additionally, since the vulnerability requires user interaction, social engineering or phishing campaigns could be used to lure users into triggering the malicious payload. The lack of impact on availability reduces the risk of service disruption but does not diminish the threat to data confidentiality and integrity.
Mitigation Recommendations
European organizations should immediately assess their use of Grafana versions 12.2.0 and 12.3.0 with Jaeger HTTP API datasources. Mitigation steps include: 1) Upgrading Grafana to a version where this vulnerability is patched once available; 2) If immediate patching is not possible, restrict access to the Explore Traces view or disable it for users who do not require it; 3) Implement strict input validation and sanitization on stack trace data before rendering, possibly through custom middleware or proxy solutions; 4) Educate users about the risks of interacting with untrusted stack trace data and encourage cautious behavior; 5) Monitor Grafana logs and network traffic for suspicious activity indicative of attempted exploitation; 6) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the Grafana web interface; 7) Limit Grafana access to trusted networks and enforce strong authentication and session management controls to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-41117: Vulnerability in Grafana grafana/grafana
Description
CVE-2025-41117 is a medium-severity vulnerability in Grafana versions 12. 2. 0 and 12. 3. 0 affecting the Explore Traces view when using datasources with the Jaeger HTTP API. The vulnerability allows malicious JavaScript injection via stack traces rendered as raw HTML, potentially leading to cross-site scripting (XSS) attacks. Exploitation requires an attacker to input malicious JavaScript into the stack trace field and user interaction to trigger the payload. Jaeger gRPC and Tempo datasources are not affected. No known exploits are currently in the wild. The vulnerability impacts confidentiality and integrity but not availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-41117 is a vulnerability identified in Grafana versions 12.2.0 and 12.3.0 that affects the Explore Traces feature when used with datasources leveraging the Jaeger HTTP API. The core issue lies in the way stack traces are rendered: they are displayed as raw HTML without proper sanitization, allowing malicious JavaScript code embedded within the stack trace field to execute in the user's browser. This constitutes a cross-site scripting (XSS) vulnerability. The attack vector requires an attacker to inject JavaScript into the stack trace data, which is then rendered in the Explore Traces view. Notably, this vulnerability does not affect Jaeger gRPC or Tempo datasources, limiting the scope to Jaeger HTTP API users. The CVSS v3.1 score is 6.8, reflecting a medium severity due to network attack vector, high impact on confidentiality and integrity, but requiring user interaction and high attack complexity. No known exploits have been reported in the wild, indicating limited active exploitation at this time. The vulnerability could allow attackers to steal session tokens, perform actions on behalf of users, or conduct phishing attacks within the Grafana interface. Since Grafana is widely used for monitoring and observability, the compromise of its interface could lead to significant information disclosure and manipulation risks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of monitoring data and user sessions within Grafana dashboards. Attackers exploiting this XSS flaw could hijack user sessions, steal sensitive monitoring data, or execute malicious actions within the Grafana environment. This is particularly critical for organizations relying on Grafana for infrastructure monitoring, application performance, and security analytics, as compromised dashboards could lead to misinformation or unauthorized access to operational insights. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. Additionally, since the vulnerability requires user interaction, social engineering or phishing campaigns could be used to lure users into triggering the malicious payload. The lack of impact on availability reduces the risk of service disruption but does not diminish the threat to data confidentiality and integrity.
Mitigation Recommendations
European organizations should immediately assess their use of Grafana versions 12.2.0 and 12.3.0 with Jaeger HTTP API datasources. Mitigation steps include: 1) Upgrading Grafana to a version where this vulnerability is patched once available; 2) If immediate patching is not possible, restrict access to the Explore Traces view or disable it for users who do not require it; 3) Implement strict input validation and sanitization on stack trace data before rendering, possibly through custom middleware or proxy solutions; 4) Educate users about the risks of interacting with untrusted stack trace data and encourage cautious behavior; 5) Monitor Grafana logs and network traffic for suspicious activity indicative of attempted exploitation; 6) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the Grafana web interface; 7) Limit Grafana access to trusted networks and enforce strong authentication and session management controls to reduce the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GRAFANA
- Date Reserved
- 2025-04-16T09:19:26.443Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698d9b14c9e1ff5ad8b1f9ec
Added to database: 2/12/2026, 9:19:16 AM
Last enriched: 2/12/2026, 9:33:45 AM
Last updated: 2/12/2026, 10:22:03 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1356: CWE-918 Server-Side Request Forgery (SSRF) in mateuszgbiorczyk Converter for Media – Optimize images | Convert WebP & AVIF
MediumCVE-2026-21722: Vulnerability in Grafana grafana/grafana
MediumCVE-2025-15577: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Valmet Valmet DNA Web Tools
HighExposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
MediumFirst Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.