High severityNVD Advisory· Published Oct 13, 2022· Updated Jan 28, 2026
Grafana plugin signature bypass vulnerability
CVE-2022-31123
Description
Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/grafana/grafanaGo | >= 9.0.0, < 9.1.8 | 9.1.8 |
github.com/grafana/grafanaGo | >= 7.0.0, < 8.5.14 | 8.5.14 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-rhxj-gh46-jvw8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-31123ghsaADVISORY
- github.com/grafana/grafana/releases/tag/v9.1.8ghsaWEB
- github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8ghsaWEB
- security.netapp.com/advisory/ntap-20221124-0002ghsaWEB
- security.netapp.com/advisory/ntap-20221124-0002/mitre
News mentions
0No linked articles in our index yet.