Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-4123

CVSS 7.6 · High EPSS 5.26% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-4123

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF. The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grafana 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grafana是Grafana开源的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana存在安全漏洞,该漏洞源于客户端路径遍历和开放重定向结合,可能导致跨站脚本攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
GrafanaGrafana 10.4.18+security-01 ~ 10.4.19 -

II. Public POCs for CVE-2025-4123

#POC DescriptionSource LinkShenlong Link
1An open redirect vulnerability in Grafana can be chained with other issues, such as XSS or SSRF, to increase impact. An attacker may exploit the redirect to target internal services or deliver malicious JavaScript, potentially leading to internal data exposure or account takeover. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-4123.yamlPOC Details
2Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRFhttps://github.com/NightBloodz/CVE-2025-4123POC Details
3CVE-2025-4123https://github.com/kk12-30/CVE-2025-4123POC Details
4Nonehttps://github.com/imbas007/CVE-2025-4123-templatePOC Details
5CVE-2025-4123 - Grafana Toolhttps://github.com/ynsmroztas/CVE-2025-4123-Exploit-Tool-Grafana-POC Details
6CVE-2025-4123https://github.com/B1ack4sh/Blackash-CVE-2025-4123POC Details
7Escaner para encontrar vulnerabilidad CVE-2025-4123 grafanahttps://github.com/DesDoTvl/CVE-2025-4123grafanaPOC Details
8Nonehttps://github.com/punitdarji/Grafana-cve-2025-4123POC Details
9Grafana CVE-2025-4123-POChttps://github.com/ItsNee/Grafana-CVE-2025-4123-POCPOC Details
10CVE-2025-4123 Grafana Open Redirect Exploithttps://github.com/MorphyKutay/CVE-2025-4123-ExploitPOC Details
11CVE-2025-4123https://github.com/Ashwesker/Blackash-CVE-2025-4123POC Details
12Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRFhttps://github.com/NightBlood0/CVE-2025-4123POC Details
13Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRFhttps://github.com/NightBloodZ/CVE-2025-4123POC Details
14CVE-2025-4123https://github.com/Ashwesker/Ashwesker-CVE-2025-4123POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-4123

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-4123

No comments yet


Leave a comment