• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Cloud

Over 46,000 Grafana Instances Vulnerable to Account Takeover

Akinola Ajibola by Akinola Ajibola
June 16, 2025
in Cloud, Security
Share on FacebookShare on Twitter

DevOps teams have been advised by security researchers to fix a high-severity vulnerability in Grafana, a widely used tool, that may be exposing them to account takeover attempts as over 46,000 Grafana instances that are visible to the internet are still unpatched and vulnerable to a client-side open redirect vulnerability that permits the execution of a malicious plugin and account takeover.

Multiple iterations of the open-source platform used to monitor and visualize infrastructure and application metrics are affected by the vulnerability, which is recorded as CVE-2025-4123.

Bug bounty hunter Alvaro Balada found the vulnerability, which Grafana Labs fixed in security upgrades published on May 21.

According to researchers from application security firm OX Security, who call the problem “The Grafana Ghost,” as of this writing, approximately one-third of all Grafana instances accessible over the public internet had not been fixed. 

The goal of the analysts’ effort, they told BleepingComputer, was to show that Balada’s discovery could be weaponized.

They evaluated the exposure by comparing the data with the platform’s spread throughout the ecosystem after identifying the versions that were susceptible to the assault.

Of the 128,864 instances they discovered online, 46,506 were still running exploitable versions. This amounts to roughly 36% of the total Grafana instances that are visible to the public, in addition to innumerable Grafana servers that are not online. This was announced on Sunday by  Ox Security and issued a warning about CVE-2025-4123.

DevOps engineers, sysadmins, and developers utilize Grafana, an open source analytics and visualization tool, to keep an eye on infrastructure and system performance.

Through a series of exploitation steps that combine client-side path traversal with open redirect mechanics, OX Security’s thorough analysis of CVE-2025-4123 revealed that attackers can trick victims into clicking URLs that cause a malicious Grafana plugin to load from a site under the threat actor’s control.

The National Vulnerability Database (NVD) describes it as a cross-site scripting (XSS) vulnerability brought on by combining an open redirect with a client path traversal.

Attackers can use this to reroute users to a page that has a frontend plugin installed, which will run arbitrary JavaScript. The XSS will function if anonymous access is enabled, and this vulnerability does not require editing permissions,” it continued.

“A full read SSRF can be accomplished by taking advantage of the open redirect if the Grafana Image Renderer plugin is installed.”

According to Ox Security, a malicious link given to the victim is the first in a series of exploits that compromise the vulnerability.

The security vendor went on to say, “When the link is clicked, Grafana uses an external malicious plugin hosted on the attacker’s server.”

The researchers claim that the malicious URLs have the potential to cause the user’s browser to run arbitrary JavaScript.

The exploit can work even with anonymous access enabled and doesn’t require escalated privileges.

The vulnerability enables attackers to alter account credentials, take over user sessions, and read internal resources by using server-side request forgery (SSRF) when the Grafana Image Renderer plugin is installed.

Grafana’s default Content Security Policy (CSP) offers some defense, but because client-side enforcement is limited, it cannot stop exploitation.

Through JavaScript routing logic built into Grafana, OX Security’s hack shows that CVE-2025-4123 may be abused client-side and used to go around contemporary browser normalization protections.

This makes account hijacking through password resets simple by enabling attackers to take advantage of URL handling irregularities to load malicious plugins that alter user email addresses.

The large number of exposed instances and the lack of authentication requirements create a significant attack surface, even though CVE-2025-4123 has several exploitation requirements, such as user interaction, an active user session when the victim clicks the link, and having the plugin feature enabled (which is enabled by default).

Grafana administrators are advised to update to versions listed below;
10.4.18+security-01,
11.2.9+security-01,
11.3.6+security-01,
11.4.4+security-01,
11.5.4+security-01,
11.6.1+security-01, and
12.0.0+security-01 in order to reduce the risk of exploitation.

“Any code can be executed by this malicious plugin on the user’s behalf. In this instance, the code that runs causes the victim’s Grafana username and login email to be changed to values that the attacker controls or may reroute to internal services. The attacker can reset the victim’s password and access their Grafana account by using the altered email.

The firm cautioned that hackers could obtain valuable operational data and business intelligence from a vulnerable organization by breaching a Grafana account. If IT teams lose access to vital systems, they may also cause serious operational problems by excluding authorized users, it continued.

According to Ox Security, “the vulnerability affects Grafana instances running locally by crafting a payload that takes advantage of the locally used domain name and port for the local service,” even though it affects a significant portion of Grafana servers that are publicly accessible.

Related Posts:

  • Microsoft SharePoint CTA
    Microsoft Warns of Critical SharePoint Zero-day…
  • 020tYFWBL4Yz8jIIFUdKDR1-22
    A Fix to Microsoft Windows Defender And Security Flaws
  • shutterstock_chatgpt
    Researchers Warn ChatGPT Crawler May Cause DDoS…
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • 633909b1-478e-4792-bf45-85ba6fe3cbcb
    Google AI Agent Big Sleep Finds First Security Flaw…
  • Screenshot-513-e1718290879733-920×513
    Apple Password App Security Flaw Exposed Users to…
  • blog5f352fc3b2393_wp
    Hackers Exploit Popular WordPress Backup Tool Used…
  • mfa-bypass-kit-simplifies-phishing-attacks-on-gmail-and-microsoft-365-accounts_1500
    New 2FA Bypass Threatens Google, Microsoft Users

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: clouddevopsgrafanasecurity
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Breaking: Google Keeps Chrome, But Judge Orders Search Data Sharing September 2, 2025
  • YouTube Premium Targets Account Sharing, Netflix-Style September 2, 2025
  • Microsoft Fixes Windows Certificate Enrolment Bug September 1, 2025
  • Microsoft to Enforce MFA on Azure Resource Management in October September 1, 2025
  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.