By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Over 46,000 Grafana instances exposed to account takeover bug
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Over 46,000 Grafana instances exposed to account takeover bug
Tech News

Over 46,000 Grafana instances exposed to account takeover bug

By admin 4 Min Read
Share
SHARE

More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover.

The flaw is tracked as CVE-2025-4123 and impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics.

The vulnerability was discovered by bug bounty hunter Alvaro Balada and was addressed in security updates that Grafana Labs released on May 21.

However, as of writing this, more than a third of all Grafana instances reachable over the public internet have not been patched, according to researchers at aplication security company OX Security, who refer to the bug as ‘The Grafana Ghost’.

The analysts told BleepingComputer that their work focused on demonstrating the ability to weaponize Balada’s finding.

After identifying versions vulnerable to the attack, they assesed the exposure by correlating the data with the platform’s distribution across the ecosystem.

They found 128,864 instances exposed online, with 46,506 still running vulnerable versions that can still be exploited. This corresponds to a percentage of about 36%.

Vulnerable Grafana endpoints as of June 13
<strong>Vulnerable Grafana endpoints</strong><br /><em>Source: BleepingComputer</em>

OX Security’s in-depth analysis of CVE-2025-4123 uncovered that, through a series of exploitation steps combining client-side path traversal with open redirect mechanics, attackers can lure victims into clicking URLs that lead to loading a malicious Grafana plugin from a site controlled by the threat actor.

The malicious links could be used to execute arbitrary JavaScript in the user’s browser, the researchers say.

The exploitation process
<strong>The exploitation process</strong><br /><em>Source: OX Security</em>

The exploit does not require elevated privileges and can function even if anonymous access is enabled.

The flaw permits attackers to hijack user sessions, change account credentials, and, in cases where the Grafana Image Renderer plugin is installed, perform server-side request forgery (SSRF) to read internal resources.

While the default Content Security Policy (CSP) in Grafana provides some protection, it does not prevent exploitation due to limitations in client-side enforcement.

OX Security’s exploit demonstrates that CVE-2025-4123 can be exploited client-side and could be leveraged to bypass modern browser normalization mechanisms by through JavaScript routing logic native to Grafana.

This allows attackers to exploit URL handling inconsistencies to serve malicious plugins, which in turn modify user email addresses, making account hijacking via password resets trivial.

Although CVE-2025-4123 has several exploitation requirements, like user interaction, an active user session when the victim clicks the link, and having the plugin feature enabled (is enabled by default), the large number of exposed instances and the lack for need of authentication create a significant attack surface.

To mitigate the risk of exploitation, it is recommended that Grafana administrators upgrade to versions 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01.

Tines Needle

Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

You Might Also Like

Enterprise Ireland leads Irish Tech Delegation Targets Nordic Growth and VC Funding at Slush 2025

Gemini 3 Is Here—and Google Says It Will Make Search Smarter

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

Cloudflare outage disrupts X, OpenAI and more

xAI Grok 4.1, Better EQ, Fewer Hallucinations, Faster Logic

TAGGED: account takeover, Grafana, Open Redirect, Vulnerability, Vulnerability Management, XSS
Share This Article
Facebook Twitter Copy Link
Previous Article Man Utd have "verbal agreement" to sign "unplayable" Premier League star
Next Article The Mysterious Inner Workings of Io, Jupiter’s Volcanic Moon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Half the Internet just broke: Cloudflare crash sparks global chaos
World News
Meta prevails in historic FTC antitrust case, won’t have to break off WhatsApp, Instagram
Business
Enterprise Ireland leads Irish Tech Delegation Targets Nordic Growth and VC Funding at Slush 2025
Tech News
France’s TotalEnergies accused of complicity in ‘civilian massacre’ in Mozambique
Business
Central Asia and South Caucasus forge stronger ties at Tashkent summit
World News
Here’s why the Nvidia stock price matters even if you don’t own it!
Business
Gemini 3 Is Here—and Google Says It Will Make Search Smarter
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Half the Internet just broke: Cloudflare crash sparks global chaos

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Half the Internet just broke: Cloudflare crash sparks global chaos
November 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?