Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33381— Users can generate Service Account tokens after permissions removal

CVSS 5.9 · Medium EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33381

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Users can generate Service Account tokens after permissions removal
Source: NVD (National Vulnerability Database)
Vulnerability Description
When a user's access to mint tokens for a service account is revoked, it is sometimes still possible to do so for a few seconds after the event. The user will eventually lose access to do this.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grafana OSS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grafana OSS是Grafana开源的一个可视化仪表盘。 Grafana OSS存在安全漏洞,该漏洞源于用户对服务账户的令牌铸造权限被撤销后,短时间内仍可能执行操作,可能导致权限管理问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
GrafanaGrafana OSS 9.2.0 ~ 11.6.14 -

II. Public POCs for CVE-2026-33381

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33381

登录查看更多情报信息。

Same Patch Batch · Grafana · 2026-05-13 · 10 CVEs total

CVE-2026-333767.4 HIGHAuth Proxy IPv6 whitelist bypass
CVE-2026-333777.1 HIGHDashboard Import Overwrites ACL — Editor Privilege Escalation to Dashboard Admin
CVE-2026-283796.5 MEDIUMViewer-triggered race condition in Grafana Live leads to complete server crash
CVE-2026-283806.5 MEDIUMBAC in Snapshot API allows deletion of unauthorized dashboard snapshots
CVE-2026-283836.5 MEDIUMGrafana plugin resources can lead to unbounded memory allocation
CVE-2026-283766.5 MEDIUMGrafana Live push endpoint allows unbounded memory allocation leading to OOM
CVE-2026-333786.5 MEDIUMGrafana Data Source Plugin: DoS (OOM) via Negative Interval Injection in $__timeGroup Macr
CVE-2026-333806.3 MEDIUMSQL Expressions Read File From Disk
CVE-2026-283744.3 MEDIUMIDOR in Annotations API allows unprivileged users to DELETE annotation

IV. Related Vulnerabilities

V. Comments for CVE-2026-33381

No comments yet


Leave a comment