Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization.
The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded.
An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript.
This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.
Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xw5p-hw8j-xg4q | Grafana vulnerable to Cross-site Scripting |
Fri, 07 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: GRAFANA
Published:
Updated: 2026-01-28T04:55:36.581Z
Reserved: 2023-01-31T10:37:31.334Z
Link: CVE-2023-0594
Updated: 2024-08-02T05:17:50.130Z
Status : Modified
Published: 2023-03-01T16:15:09.743
Modified: 2024-11-21T07:37:27.510
Link: CVE-2023-0594
OpenCVE Enrichment
No data.
Github GHSA