By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Over 46,000 Grafana instances exposed to account takeover bug
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Over 46,000 Grafana instances exposed to account takeover bug
Tech News

Over 46,000 Grafana instances exposed to account takeover bug

By admin 4 Min Read
Share
SHARE

More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover.

The flaw is tracked as CVE-2025-4123 and impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics.

The vulnerability was discovered by bug bounty hunter Alvaro Balada and was addressed in security updates that Grafana Labs released on May 21.

However, as of writing this, more than a third of all Grafana instances reachable over the public internet have not been patched, according to researchers at aplication security company OX Security, who refer to the bug as ‘The Grafana Ghost’.

The analysts told BleepingComputer that their work focused on demonstrating the ability to weaponize Balada’s finding.

After identifying versions vulnerable to the attack, they assesed the exposure by correlating the data with the platform’s distribution across the ecosystem.

They found 128,864 instances exposed online, with 46,506 still running vulnerable versions that can still be exploited. This corresponds to a percentage of about 36%.

Vulnerable Grafana endpoints as of June 13
<strong>Vulnerable Grafana endpoints</strong><br /><em>Source: BleepingComputer</em>

OX Security’s in-depth analysis of CVE-2025-4123 uncovered that, through a series of exploitation steps combining client-side path traversal with open redirect mechanics, attackers can lure victims into clicking URLs that lead to loading a malicious Grafana plugin from a site controlled by the threat actor.

The malicious links could be used to execute arbitrary JavaScript in the user’s browser, the researchers say.

The exploitation process
<strong>The exploitation process</strong><br /><em>Source: OX Security</em>

The exploit does not require elevated privileges and can function even if anonymous access is enabled.

The flaw permits attackers to hijack user sessions, change account credentials, and, in cases where the Grafana Image Renderer plugin is installed, perform server-side request forgery (SSRF) to read internal resources.

While the default Content Security Policy (CSP) in Grafana provides some protection, it does not prevent exploitation due to limitations in client-side enforcement.

OX Security’s exploit demonstrates that CVE-2025-4123 can be exploited client-side and could be leveraged to bypass modern browser normalization mechanisms by through JavaScript routing logic native to Grafana.

This allows attackers to exploit URL handling inconsistencies to serve malicious plugins, which in turn modify user email addresses, making account hijacking via password resets trivial.

Although CVE-2025-4123 has several exploitation requirements, like user interaction, an active user session when the victim clicks the link, and having the plugin feature enabled (is enabled by default), the large number of exposed instances and the lack for need of authentication create a significant attack surface.

To mitigate the risk of exploitation, it is recommended that Grafana administrators upgrade to versions 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01.

Tines Needle

Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

You Might Also Like

AI adoption with API readiness platform Jentic 

Terrifying New Photos Emerge From the Jeffrey Epstein Estate

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

All-island coordination needed to unlock tech scale-up opportunities

Samsung Reveals 2026 Micro RGB Series

TAGGED: account takeover, Grafana, Open Redirect, Vulnerability, Vulnerability Management, XSS
Share This Article
Facebook Twitter Copy Link
Previous Article Man Utd have "verbal agreement" to sign "unplayable" Premier League star
Next Article The Mysterious Inner Workings of Io, Jupiter’s Volcanic Moon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Here’s why I’m bullish on the FTSE 100 for 2026
Business
Who Is Riley Keough? 5 Things to Know About Lisa Marie Presley’s Daughter
Celebrity
Jelly Roll, country-rap superstar who found music while serving prison time, pardoned by Tennessee governor in front of Christmas Tree
Business
Exodus Studio Co-Founder Stepping Aside, Blizzard Veteran to Head Hasbro’s Gaming Division
Gaming News
Bitcoin Could Remain Calmer Than Nvidia Through 2026, Bitwise Predicts
Crypto
AI adoption with API readiness platform Jentic 
Tech News
Terrifying New Photos Emerge From the Jeffrey Epstein Estate
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Here’s why I’m bullish on the FTSE 100 for 2026

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Here’s why I’m bullish on the FTSE 100 for 2026
December 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?