Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21724: Vulnerability in Grafana Grafana OSS

0
Medium
VulnerabilityCVE-2026-21724cvecve-2026-21724
Published: Thu Mar 26 2026 (03/26/2026, 20:06:18 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: Grafana OSS

Description

A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the required alert.notifications.receivers.protected:write permission.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 21:46:37 UTC

Technical Analysis

CVE-2026-21724 is an authorization bypass vulnerability discovered in Grafana OSS, a widely used open-source platform for monitoring and observability. The issue resides in the provisioning contact points API, which manages alert notification endpoints such as webhook URLs. Normally, modifying protected webhook URLs requires the alert.notifications.receivers.protected:write permission to prevent unauthorized changes. However, this vulnerability allows users assigned the Editor role—who typically have limited privileges—to circumvent this permission check and alter these protected webhook URLs. This can lead to unauthorized disclosure or manipulation of alert notifications, potentially redirecting sensitive alert data to attacker-controlled endpoints. The vulnerability affects multiple recent versions of Grafana OSS starting from 11.6.9 through 12.3.1 and later. The CVSS v3.1 score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low complexity, and privileges of an Editor role, but does not require user interaction. The impact primarily concerns confidentiality and integrity, with no direct availability impact. No public exploits or active exploitation have been reported to date. The vulnerability was reserved in early January 2026 and published in late March 2026. Since Grafana is widely deployed in enterprises for monitoring infrastructure and applications, this vulnerability could be leveraged by insiders or compromised accounts with Editor privileges to manipulate alerting mechanisms.

Potential Impact

The vulnerability allows unauthorized modification of protected webhook URLs used in alert notifications, which can lead to several impacts for organizations. Confidentiality may be compromised if alert data containing sensitive operational or security information is redirected to attacker-controlled endpoints. Integrity is affected because attackers can manipulate alerting workflows, potentially suppressing or falsifying alerts, which can delay incident response or cause misinformed decisions. Although availability is not directly impacted, the indirect effect of altered alerts could degrade operational monitoring effectiveness. Organizations relying heavily on Grafana OSS for critical infrastructure monitoring, security alerting, or compliance reporting may face increased risk of undetected incidents or data leakage. The requirement of Editor role privileges limits the attack surface to users with some level of access, but insider threats or compromised accounts elevate the risk. Since no known exploits are reported, the immediate widespread impact is limited, but the vulnerability presents a significant risk if exploited in targeted attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first upgrade Grafana OSS to a version where the issue is patched once available. Until a patch is released, administrators should review and restrict the assignment of Editor roles to trusted personnel only, minimizing the number of users who can exploit this flaw. Implementing strict access controls and monitoring for unusual modifications to webhook URLs or alerting configurations can help detect exploitation attempts. Employing multi-factor authentication (MFA) for all users with elevated privileges reduces the risk of account compromise. Additionally, segregate duties so that users with Editor roles do not have permissions to modify critical alerting components. Regularly audit alert notification configurations and webhook endpoints to ensure they have not been altered unexpectedly. Network-level controls such as firewall rules or webhook endpoint whitelisting can limit the impact of unauthorized webhook changes. Finally, maintain comprehensive logging and alerting on configuration changes within Grafana to enable rapid incident response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2026-01-05T09:26:06.214Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5a54c3c064ed76fcfc86d

Added to database: 3/26/2026, 9:29:48 PM

Last enriched: 3/26/2026, 9:46:37 PM

Last updated: 3/26/2026, 10:31:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses