Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33375: Vulnerability in Grafana Grafana OSS

0
Medium
VulnerabilityCVE-2026-33375cvecve-2026-33375
Published: Thu Mar 26 2026 (03/26/2026, 20:05:52 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: Grafana OSS

Description

CVE-2026-33375 is a medium-severity vulnerability in the Grafana OSS MSSQL data source plugin that allows a low-privileged Viewer user to bypass API restrictions and cause an Out-Of-Memory (OOM) condition, crashing the host container. This flaw affects multiple recent versions of Grafana OSS, specifically 11. 6. 0 and 12. 1. 0 through 12. 4. 0. Exploitation requires no user interaction but does require low-level privileges within Grafana. The vulnerability impacts availability by causing service disruption but does not compromise confidentiality or integrity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 22:15:48 UTC

Technical Analysis

CVE-2026-33375 is a logic flaw identified in the MSSQL data source plugin of Grafana OSS, a widely used open-source analytics and monitoring platform. The vulnerability allows a user with Viewer-level privileges—typically a low-privileged role intended only for dashboard viewing—to bypass API restrictions designed to limit resource-intensive operations. By exploiting this flaw, the attacker can trigger a catastrophic Out-Of-Memory (OOM) condition within the host container running Grafana, leading to a crash and denial of service. This is achieved without requiring user interaction and without escalating privileges beyond the Viewer role. The affected versions include Grafana OSS 11.6.0 and versions 12.1.0 through 12.4.0. The vulnerability impacts availability exclusively, as it does not allow unauthorized data access or modification. The CVSS v3.1 base score is 6.5, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, and high impact on availability. No public exploits or active exploitation have been reported to date. The flaw stems from improper validation or control logic within the MSSQL plugin's API handling, allowing resource exhaustion attacks by low-privileged users. This vulnerability is particularly concerning in containerized environments where Grafana is deployed, as the OOM crash can disrupt monitoring and analytics services critical for operational awareness.

Potential Impact

The primary impact of CVE-2026-33375 is a denial-of-service condition caused by an Out-Of-Memory crash of the Grafana host container. This can disrupt monitoring dashboards and analytics, potentially blinding operational teams to system health and security events. Organizations relying on Grafana OSS for real-time monitoring of infrastructure, applications, or security events may experience service outages or delayed incident response. Although the vulnerability does not expose sensitive data or allow data tampering, the loss of availability can have cascading effects on operational continuity and incident management. Attackers with low-level access can exploit this flaw remotely over the network without user interaction, increasing the risk of automated or large-scale exploitation attempts. The impact is heightened in environments where Grafana is deployed as a critical component of observability stacks, especially in containerized or cloud-native infrastructures. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Organizations that do not promptly address this vulnerability may face increased risk of service disruption and operational impact.

Mitigation Recommendations

To mitigate CVE-2026-33375, organizations should prioritize upgrading Grafana OSS to versions that address this vulnerability once patches are released. In the absence of official patches, administrators can implement temporary controls such as restricting Viewer role assignments to trusted users only and monitoring for unusual API usage patterns indicative of resource exhaustion attempts. Limiting network access to the Grafana instance through firewall rules or VPNs can reduce exposure to remote attackers. Container resource limits and quotas should be configured to prevent a single process from exhausting host memory, thereby containing the impact of an OOM event. Additionally, monitoring container logs and Grafana metrics for signs of abnormal memory usage can provide early warning of exploitation attempts. Reviewing and tightening API permissions and rate limiting API calls from low-privileged users can further reduce risk. Finally, organizations should maintain an incident response plan that includes recovery procedures for Grafana service outages to minimize operational disruption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2026-03-19T07:55:06.977Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5ac523c064ed76fd41c4b

Added to database: 3/26/2026, 9:59:46 PM

Last enriched: 3/26/2026, 10:15:48 PM

Last updated: 3/26/2026, 11:05:01 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses