Grafana 12.3.x < 12.3.1 Multiple Vulnerabilities

high Web App Scanning Plugin ID 115196

Synopsis

Grafana 12.3.x < 12.3.1 Multiple Vulnerabilities

Description

According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.6.9, or 12.0.x prior to 12.0.8, or 12.1.x prior to 12.1.5, or 12.2.x prior to 12.2.3, or 12.3.x prior to 12.3.1. It is, therefore, affected by multiple vulnerabilities.

- The platform supports users having their own avatars, which can be sourced from the Gravatar service API. This uses a cache, to ensure that we don't overload the service. If these requests time out after 3 seconds, a Goroutine is left running forever. This can cause a denial of service (DoS) if an attacker repeats these requests.

- If a user has permission management rights on one dashboard, they could edit the permissions of any other dashboard.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update to Grafana version 12.3.1 or later.

See Also

https://grafana.com/security/security-advisories/cve-2026-21720/

https://grafana.com/security/security-advisories/cve-2026-21721/

Plugin Details

Severity: High

ID: 115196

Type: Version Based

Published: 4/2/2026

Updated: 4/2/2026

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N

CVSS Score Source: CVE-2026-21721

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS Score Source: CVE-2026-21721

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/26/2026

Reference Information

CVE: CVE-2026-21720, CVE-2026-21721