<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Vulnerability Spoiler Alert - grafana/grafana</title>
    <link>https://spaceraccoon.github.io/vulnerability-spoiler-alert</link>
    <description>Vulnerability alerts for grafana/grafana</description>
    <language>en-us</language>
    <lastBuildDate>Fri, 17 Apr 2026 01:52:35 GMT</lastBuildDate>
    <atom:link href="https://spaceraccoon.github.io/vulnerability-spoiler-alert/feed/grafana-grafana.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>[MEDIUM] Denial of Service (Unbounded Request Body) in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/125</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/125</guid>
      <pubDate>Mon, 30 Mar 2026 12:36:49 GMT</pubDate>
      <description>The OFREP endpoint&apos;s `validateNamespace` function used `io.ReadAll(r.Body)` without any size limit, allowing an attacker to send arbitrarily large request bodies that would be fully read into memory. This could exhaust server memory and cause a denial of service. The fix applies `http.MaxBytesReader` to limit the body to 1 MiB before reading.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Denial of Service (Resource Exhaustion) in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/123</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/123</guid>
      <pubDate>Fri, 27 Mar 2026 14:45:04 GMT</pubDate>
      <description>The fill resampling feature in Grafana&apos;s SQL datasources (MySQL, PostgreSQL, MSSQL) could be exploited to cause excessive memory allocation. By crafting a query with a very large time range and a very small fill interval (e.g., time range spanning years with millisecond intervals), an attacker could trigger `sqlutil.ResampleWideFrame` to allocate an enormous number of data points, exhausting server memory and causing a denial of service. The patch adds a guard that skips the fill operation if the number of fill points would exceed the configured row limit.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Sensitive Data Exposure in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/122</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/122</guid>
      <pubDate>Fri, 27 Mar 2026 08:29:30 GMT</pubDate>
      <description>When a user creates a Kubernetes resource containing inline secure values (raw secrets) via kubectl apply, the kubectl client automatically stores the full object including the raw secret value in the `kubectl.kubernetes.io/last-applied-configuration` annotation. This annotation is persisted in the API server and can be read back by anyone with read access to the resource, effectively leaking the raw secret value. The patch clears this annotation when a raw secret is detected in the inline secure values section, preventing the secret from being stored in plaintext in the annotation.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Broken Access Control / Authorization Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/120</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/120</guid>
      <pubDate>Thu, 26 Mar 2026 09:05:25 GMT</pubDate>
      <description>Before this patch, the Kubernetes-style IAM API endpoint `/apis/iam.grafana.app/v0alpha1/namespaces/{ns}/users/{name}/teams` used the generic `ResourceAuthorizer` which only checked `get` permission on the `users` resource itself, but did not properly enforce the `teams` subresource authorization. According to the commit, the RBAC service would ignore the &apos;teams&apos; subresource check, meaning any user with generic `users:read` permission could potentially access team membership data for users they shouldn&apos;t be able to see. The patch adds a dedicated `UserAuthorizer` that explicitly checks `get` permission on the parent user when the `teams` subresource is requested.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Broken Access Control / Information Disclosure in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/119</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/119</guid>
      <pubDate>Wed, 25 Mar 2026 16:21:48 GMT</pubDate>
      <description>The `/api/alertmanager/grafana/api/v2/status` endpoint was protected by the `alert.notifications:read` permission, which is granted to Viewers and Editors by default. This allowed any authenticated user (including low-privileged Viewers) to access Alertmanager system status information including routing configuration, receivers configuration, and other sensitive system details. The patch replaces this with a new dedicated `alert.notifications.system-status:read` permission that is only granted to Admin users.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Authorization Bypass / Improper Access Control in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/118</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/118</guid>
      <pubDate>Wed, 25 Mar 2026 14:48:37 GMT</pubDate>
      <description>Before the patch, the `validateWriteAccess` function did not handle `JobActionFixFolderMetadata` in its switch statement, meaning it fell through to the `default` case which applies no ref-based restriction. This allowed users to trigger a fix-folder-metadata job that would write directly to the default/main branch even when the repository was configured with only a &apos;branch&apos; workflow (meaning the default branch should be read-only). The patch adds the missing case to extract the target ref from `FixFolderMetadata.Ref` and apply proper write permission checks.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Broken Access Control / Privilege Escalation in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/89</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/89</guid>
      <pubDate>Fri, 20 Mar 2026 23:04:40 GMT</pubDate>
      <description>Before this patch, the GET /api/alertmanager/grafana/config/api/v1/alerts endpoint (which returns the raw Alertmanager configuration blob, potentially containing sensitive credentials like SMTP passwords, webhook secrets, and API tokens) was accessible to any user with the broad &apos;alert.notifications:read&apos; permission, which was granted to Viewers and Editors. Similarly, GET /config/history and POST /config/history/{id}/_activate were accessible to users with alert.notifications:read/write. The patch restricts these endpoints to admin-only via new fine-grained RBAC actions (alert.notifications.config-history:read/write).</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[CRITICAL] XML Signature Wrapping / Authentication Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/87</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/87</guid>
      <pubDate>Fri, 20 Mar 2026 09:44:54 GMT</pubDate>
      <description>GHSA-479m-364c-43vc describes a vulnerability in github.com/russellhaering/goxmldsig (used for SAML XML digital signature validation) where an attacker could bypass XML signature verification. The library also depends on github.com/beevik/etree for XML parsing, and the combination of versions before this fix allowed signature wrapping attacks where a malicious SAML response could include a valid signature over one element while the actual authenticated data came from a different, attacker-controlled element. This allowed authentication bypass in Grafana&apos;s SAML SSO implementation.</description>
      <category>critical</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Open Redirect in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/86</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/86</guid>
      <pubDate>Thu, 19 Mar 2026 11:55:47 GMT</pubDate>
      <description>The Grafana short URL feature allowed authenticated users to create short URLs with arbitrary target paths, including external URLs like `http://evil.com` or protocol-relative URLs like `//evil.com`. When a victim clicked a Grafana short URL, they would be silently redirected to the attacker-controlled external domain. The patch adds validation at both creation time and redirect time to ensure paths are always relative and cannot contain schemes, protocol-relative prefixes, or other external URL patterns.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Denial of Service / HTTP/2 Protocol Vulnerability in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/85</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/85</guid>
      <pubDate>Thu, 19 Mar 2026 10:26:36 GMT</pubDate>
      <description>This commit patches CVE-2026-33186 in the google.golang.org/grpc library by upgrading from v1.79.1 to v1.79.3. The vulnerability exists in the gRPC-Go HTTP/2 implementation and can be exploited to cause a denial of service condition. The patch updates the dependency across multiple Go modules in the Grafana repository to remediate the vulnerability.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Authorization Bypass / Privilege Escalation in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/83</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/83</guid>
      <pubDate>Wed, 18 Mar 2026 11:30:36 GMT</pubDate>
      <description>Before the patch, a resource manager could be changed directly from one manager to another (e.g., from repo:abc to terraform:xyz) in a single update operation without going through a remove-then-add workflow. This allowed one management system (e.g., Terraform) to silently take over resources managed by another system (e.g., a Git repository), potentially leading to unauthorized control over managed resources and unpredictable reconciliation conflicts. The patch adds an explicit check that blocks any update where both old and new objects have a manager set but with different values, returning HTTP 403.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Broken Access Control in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/82</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/82</guid>
      <pubDate>Tue, 17 Mar 2026 23:42:42 GMT</pubDate>
      <description>Before this patch, the Grafana Live push endpoint (`/api/live/push/:streamId`) had no RBAC authorization check, allowing any authenticated user (including Viewers) to push metrics and events to Grafana Live streams. The patch adds an `authorize(ac.EvalPermission(ac.ActionLivePush))` middleware that restricts this endpoint to users with the `live:push` permission (granted to Editors and Admins by default).</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Authentication Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/80</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/80</guid>
      <pubDate>Tue, 17 Mar 2026 19:06:19 GMT</pubDate>
      <description>The MSSQL connection string was built by directly concatenating the username and password without escaping special characters. Since semicolons are used as key-value delimiters in the connection string, a password containing a semicolon would be truncated at the semicolon, allowing authentication bypass or connection to unintended databases. For example, a password like `StrongPass;database=other` would cause the driver to parse `database=other` as a separate connection string parameter.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Authorization Bypass / Privilege Escalation in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/79</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/79</guid>
      <pubDate>Tue, 17 Mar 2026 15:19:41 GMT</pubDate>
      <description>The provisioning API&apos;s `UpdateContactPoint` endpoint did not perform authorization checks for protected fields (e.g., webhook URLs, API keys) before the patch. Any user with access to the provisioning API could modify protected/sensitive fields in contact points without the required `receivers:update.protected` permission, bypassing the security controls enforced by the regular receiver API. The patch adds a `checkProtectedFields` method that verifies the user has appropriate permissions before allowing modifications to protected fields.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Missing Authorization / Broken Access Control in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/74</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/74</guid>
      <pubDate>Mon, 16 Mar 2026 23:39:58 GMT</pubDate>
      <description>Before this patch, the Kubernetes API endpoints for dashboard snapshots (GET, LIST, DELETE, POST /create, DELETE /delete/{deleteKey}, GET /settings) used a default `ServiceAuthorizer` that did not enforce RBAC permissions for snapshot resources. Any authenticated user, regardless of their assigned permissions, could read, list, create, and delete snapshots. The patch adds a `SnapshotAuthorizer` that maps K8s verbs to Grafana RBAC actions (`snapshots:read`, `snapshots:create`, `snapshots:delete`) and applies RBAC checks to the custom HTTP routes as well.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Broken Access Control / Insecure Direct Object Reference in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/73</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/73</guid>
      <pubDate>Mon, 16 Mar 2026 19:56:58 GMT</pubDate>
      <description>Public dashboard CRUD endpoints (Delete, Update, ExistsEnabledByDashboardUid) were only checking the user&apos;s role/permissions but not validating that the public dashboard being operated on belonged to the same organization as the requesting user. This allowed an authenticated user with Editor+ permissions in Org B to delete, update, or check the existence of public dashboards belonging to Org A, without having access to the source dashboard. The patch adds org_id checks to all relevant database queries to enforce org isolation.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] XSS / Prototype Pollution in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/72</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/72</guid>
      <pubDate>Fri, 06 Mar 2026 08:43:52 GMT</pubDate>
      <description>DOMPurify 3.3.1 contained multiple security vulnerabilities: a bypass via jsdom&apos;s faulty raw-text tag parsing that could allow XSS payloads to pass through sanitization, a prototype pollution issue when working with custom elements, and a lenient config parsing issue in `_isValidAttribute`. These vulnerabilities could allow attackers to inject malicious HTML/JavaScript that bypasses DOMPurify&apos;s sanitization, leading to XSS attacks in Grafana&apos;s frontend which uses DOMPurify to sanitize user-supplied content.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Regular Expression Denial of Service (ReDoS) in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/71</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/71</guid>
      <pubDate>Fri, 06 Mar 2026 08:43:36 GMT</pubDate>
      <description>The minimatch package prior to version 3.1.2 (and related versions) contained a ReDoS vulnerability (CVE-2022-3517) where specially crafted patterns could cause catastrophic backtracking in the regular expression engine. This patch upgrades minimatch from vulnerable versions (3.0.5, 9.0.3, 5.0.1, 7.4.6) to patched versions (3.1.4, 10.2.4, 5.1.9, 7.4.9) that fix the ReDoS issue. The vulnerability could allow an attacker to cause denial of service by providing a malicious glob pattern.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Prototype Pollution in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/70</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/70</guid>
      <pubDate>Fri, 06 Mar 2026 08:23:33 GMT</pubDate>
      <description>The immutable library versions prior to 5.1.5 contained a Prototype Pollution vulnerability (Improperly Controlled Modification of Object Prototype Attributes). This allowed attackers to manipulate JavaScript object prototypes through specially crafted keys like &apos;__proto__&apos;, &apos;constructor&apos;, or &apos;prototype&apos;, potentially affecting all objects in the application. The patch upgrades immutable from 5.1.4 to 5.1.5 which fixes this vulnerability.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Path Traversal / Arbitrary File Overwrite in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/67</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/67</guid>
      <pubDate>Tue, 03 Mar 2026 15:02:11 GMT</pubDate>
      <description>The `tar` npm package versions 6.x and earlier contain a path traversal vulnerability (CVE-2024-28863 and related CVEs) where specially crafted tar archives can write files outside the intended extraction directory. By bumping `tar` from version 6.x to 7.x, this patch removes the vulnerable version and its dependency chain (including the old `cacache@^15.2.0` which depended on `tar@^6.0.2`). The vulnerability allowed an attacker to craft a malicious tarball that, when extracted, could overwrite arbitrary files on the filesystem.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Authentication Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/54</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/54</guid>
      <pubDate>Tue, 24 Feb 2026 20:06:18 GMT</pubDate>
      <description>The code allowed SAML authentication to create duplicate user_auth records for SCIM-provisioned users instead of updating existing ones. An attacker could exploit this by logging in via SAML with a SCIM user&apos;s credentials to create a new auth record with their own AuthID, potentially bypassing access controls or creating authentication confusion.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Man-in-the-Middle Attack / Insufficient Certificate Validation in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/51</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/51</guid>
      <pubDate>Tue, 24 Feb 2026 09:33:41 GMT</pubDate>
      <description>The code before the patch used HTTP transport without proper TLS certificate validation when communicating with external image renderer services. This allowed attackers to intercept HTTPS communications through man-in-the-middle attacks, potentially exposing authentication tokens and sensitive data. The patch adds support for custom CA certificates to enable proper certificate validation.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Open Redirect in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/47</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/47</guid>
      <pubDate>Mon, 23 Feb 2026 10:32:22 GMT</pubDate>
      <description>The ValidateRedirectTo function was vulnerable to open redirect attacks through URL fragments. Attackers could bypass path validation by using URL fragments containing dangerous patterns like &apos;../&apos; or &apos;//&apos;, which were not sanitized before the redirect. The patch fixes this by validating fragments and returning a sanitized URL string instead of the original user input.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Authorization Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/43</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/43</guid>
      <pubDate>Fri, 20 Feb 2026 08:43:39 GMT</pubDate>
      <description>The old authorization system used deprecated Compile method which performed authorization checks item-by-item during iteration, potentially allowing unauthorized access to resources due to race conditions or incomplete authorization state. The patch replaces this with FilterAuthorized using BatchCheck which performs more robust batch authorization before returning results.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Hash Collision in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/41</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/41</guid>
      <pubDate>Thu, 19 Feb 2026 18:31:51 GMT</pubDate>
      <description>The code was truncating SHA256 hashes to only 10 characters when generating secret names, dramatically increasing collision probability from negligible to ~1 in 16^10. This allows attackers to craft field names that collide with existing secret field names, potentially accessing or modifying secrets they shouldn&apos;t have access to.</description>
      <category>medium</category>
      <category>confirmed</category>
    </item>
    <item>
      <title>[MEDIUM] Race Condition in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/36</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/36</guid>
      <pubDate>Thu, 19 Feb 2026 13:27:44 GMT</pubDate>
      <description>The code had a race condition vulnerability during database migrations where concurrent writes to legacy tables could occur during unified storage migrations in rolling upgrade scenarios. This could lead to data corruption or inconsistent state as multiple processes could simultaneously modify the same database tables without proper synchronization.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Authentication Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/35</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/35</guid>
      <pubDate>Thu, 19 Feb 2026 10:13:09 GMT</pubDate>
      <description>The code had a fallback authentication mechanism that would allow any request to bypass authorization checks when the primary authenticator failed. The fallback would accept requests with only namespace validation, effectively allowing unauthorized access to resources.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Access Control Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/34</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/34</guid>
      <pubDate>Wed, 18 Feb 2026 22:42:29 GMT</pubDate>
      <description>The scope resolver cache was not invalidated when datasources were deleted, causing stale name-to-UID mappings. When a datasource was deleted and a new one created with the same name, the cached entry would resolve to the deleted datasource&apos;s UID, leading to incorrect authorization decisions. The patch fixes this by invalidating the cache entry for the datasource name scope during deletion.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Information Disclosure in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/33</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/33</guid>
      <pubDate>Wed, 18 Feb 2026 22:42:17 GMT</pubDate>
      <description>The code exposed encrypted datasource secrets even when they were empty, potentially leaking secret metadata or encrypted empty values to unauthorized users. The patch fixes this by filtering out empty secrets before returning them in API responses.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Information Disclosure in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/31</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/31</guid>
      <pubDate>Wed, 18 Feb 2026 12:05:51 GMT</pubDate>
      <description>The audit logging configuration was exposing sensitive data source request and response bodies by default. This could lead to credentials, API keys, and sensitive query data being logged in plaintext audit files accessible to system administrators.</description>
      <category>medium</category>
      <category>confirmed</category>
    </item>
    <item>
      <title>[HIGH] Authorization Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/29</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/29</guid>
      <pubDate>Tue, 17 Feb 2026 16:03:27 GMT</pubDate>
      <description>The rolebindings API was accessible to all authenticated users without proper authorization checks. This allowed any user to potentially view, modify, or create role bindings, leading to privilege escalation. The patch restricts access to only access policy identities.</description>
      <category>high</category>
      <category>confirmed</category>
    </item>
    <item>
      <title>[MEDIUM] Authorization Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/22</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/22</guid>
      <pubDate>Mon, 16 Feb 2026 10:04:29 GMT</pubDate>
      <description>The endpoint allowed any authenticated user to access team member information without proper authorization checks. The patch adds a permission check requiring &apos;GetPermissions&apos; verb on the Team resource before returning member data.</description>
      <category>medium</category>
      <category>confirmed</category>
    </item>
    <item>
      <title>[MEDIUM] Resource Deletion Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/21</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/21</guid>
      <pubDate>Mon, 16 Feb 2026 08:00:28 GMT</pubDate>
      <description>The code allowed updating Repository resources to remove all finalizers, which would cause immediate deletion without proper cleanup when the resource is later deleted. This bypasses the intended cleanup workflow and could lead to orphaned resources or incomplete cleanup operations.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Authorization Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/20</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/20</guid>
      <pubDate>Mon, 16 Feb 2026 07:36:22 GMT</pubDate>
      <description>The files API endpoints were not enforcing quota limits, allowing authenticated users to bypass resource quotas and create unlimited files/dashboards. This could lead to resource exhaustion and denial of service. The patch adds quota checks before allowing POST/PUT operations on files.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Authorization Bypass in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/16</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/16</guid>
      <pubDate>Fri, 13 Feb 2026 18:44:38 GMT</pubDate>
      <description>The MT IAM API server was using a no-op storage backend for RoleBindings, which silently dropped all write operations and returned empty results for reads. Additionally, the authorizer denied all access to rolebindings. This created an authorization bypass where RBAC role bindings were completely non-functional, potentially allowing unauthorized access or preventing proper access controls from being enforced.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Privilege Escalation in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/11</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/11</guid>
      <pubDate>Wed, 11 Feb 2026 12:26:16 GMT</pubDate>
      <description>The vulnerability allows attackers to bypass time range restrictions on public dashboards when time selection is disabled. By manipulating request time parameters, attackers can access annotations outside the intended dashboard time range, potentially exposing sensitive data from unauthorized time periods.</description>
      <category>high</category>
      <category>confirmed</category>
    </item>
    <item>
      <title>[MEDIUM] XSS in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/10</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/10</guid>
      <pubDate>Wed, 11 Feb 2026 12:26:10 GMT</pubDate>
      <description>The code was vulnerable to Cross-Site Scripting (XSS) by directly rendering user-controlled data via dangerouslySetInnerHTML without sanitization. Malicious trace data could inject JavaScript that would execute in users&apos; browsers. The patch fixes this by sanitizing HTML content with DOMPurify before rendering.</description>
      <category>medium</category>
      <category>confirmed</category>
    </item>
    <item>
      <title>[MEDIUM] Header Injection in grafana/grafana</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/9</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/9</guid>
      <pubDate>Wed, 11 Feb 2026 00:53:34 GMT</pubDate>
      <description>The code forwards arbitrary HTTP headers from incoming requests to outgoing gRPC calls without proper validation or sanitization. An attacker can inject malicious headers that could be used to bypass security controls, manipulate downstream services, or perform request smuggling attacks.</description>
      <category>medium</category>
      <category>confirmed</category>
    </item>
  </channel>
</rss>