Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21722: Vulnerability in Grafana grafana/grafana

0
Medium
VulnerabilityCVE-2026-21722cvecve-2026-21722
Published: Thu Feb 12 2026 (02/12/2026, 08:49:05 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: grafana/grafana

Description

Public dashboards with annotations enabled did not limit their annotation timerange to the locked timerange of the public dashboard. This means one could read the entire history of annotations visible on the specific dashboard, even those outside the locked timerange. This did not leak any annotations that would not otherwise be visible on the public dashboard.

AI-Powered Analysis

AILast updated: 02/28/2026, 12:12:19 UTC

Technical Analysis

CVE-2026-21722 is a vulnerability identified in the Grafana open-source analytics and monitoring platform, specifically affecting versions 9.3.0, 12.0.0, 12.2.0, and 12.3.0. The issue arises from improper enforcement of annotation timerange restrictions on public dashboards with annotations enabled. Normally, public dashboards can be locked to a specific timerange to restrict data visibility. However, due to this vulnerability, the annotation timerange was not constrained to the locked timerange, allowing anyone accessing the public dashboard to read the entire history of annotations visible on that dashboard, including annotations outside the locked timerange. Importantly, this does not expose annotations that are not already visible on the public dashboard, so it does not leak data beyond the dashboard's public scope. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level, with an attack vector of network (remote), no privileges required, no user interaction, and limited confidentiality impact. There is no indication of integrity or availability impact. No known exploits have been reported in the wild as of the publication date. The root cause is a failure to properly restrict annotation queries to the locked timerange, which could be addressed by patching Grafana to enforce timerange limits on annotations consistently. This vulnerability is relevant for organizations exposing Grafana dashboards publicly with annotations enabled and relying on timerange locking to limit data exposure.

Potential Impact

The primary impact of CVE-2026-21722 is a confidentiality risk where sensitive historical annotation data on public Grafana dashboards may be exposed beyond intended time restrictions. Organizations that use Grafana dashboards publicly to share monitoring or analytics data with annotations could inadvertently reveal more historical context than intended, potentially disclosing sensitive operational or security-related information embedded in annotations. Although the vulnerability does not allow access to annotations outside the public dashboard's visibility scope, the extended timerange exposure could still provide attackers or unauthorized viewers with additional insight into system events or incidents. This could aid reconnaissance or social engineering efforts. Since the vulnerability does not affect integrity or availability, the risk is limited to information disclosure. The ease of exploitation (no authentication or user interaction required) increases the likelihood of opportunistic scanning or data harvesting. Organizations relying on Grafana for critical infrastructure monitoring, cloud services, or industrial control systems could face reputational damage or compliance issues if sensitive annotation data is exposed. However, the lack of known exploits and the medium severity score suggest the threat is moderate but should not be ignored.

Mitigation Recommendations

To mitigate CVE-2026-21722, organizations should promptly update affected Grafana instances to versions where this vulnerability is fixed once patches are released by the vendor. Until patches are available, administrators should consider disabling public dashboards with annotations enabled or restrict public access using network-level controls such as VPNs, IP whitelisting, or authentication gateways. Reviewing and minimizing the use of annotations on public dashboards can reduce exposure. Additionally, implementing strict access controls and monitoring for unusual access patterns to public dashboards can help detect exploitation attempts. Organizations should audit existing dashboards to verify timerange locking is enforced as expected and remove any sensitive annotation data from publicly accessible dashboards. Employing Web Application Firewalls (WAFs) with custom rules to detect abnormal annotation queries may provide temporary protection. Finally, educating dashboard creators about the risks of exposing annotations publicly and enforcing internal policies on dashboard publication can reduce future risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2026-01-05T09:26:06.214Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698d9b14c9e1ff5ad8b1f9ef

Added to database: 2/12/2026, 9:19:16 AM

Last enriched: 2/28/2026, 12:12:19 PM

Last updated: 3/12/2026, 6:23:29 AM

Views: 853

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses