Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
History

Wed, 23 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-02-08T20:40:10.000Z

Updated: 2025-04-23T19:06:44.591Z

Reserved: 2021-11-16T00:00:00.000Z

Link: CVE-2022-21703

cve-icon Vulnrichment

Updated: 2024-08-03T02:53:35.380Z

cve-icon NVD

Status : Modified

Published: 2022-02-08T21:15:20.150

Modified: 2024-11-21T06:45:16.160

Link: CVE-2022-21703

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-02-08T00:00:00Z

Links: CVE-2022-21703 - Bugzilla