Critical severityNVD Advisory· Published Oct 18, 2024· Updated Mar 14, 2025
Grafana SQL Expressions allow for remote code execution
CVE-2024-9264
Description
The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/grafana/grafanaGo | >= 11.0.0, < 11.0.6+security-01 | 11.0.6+security-01 |
github.com/grafana/grafanaGo | >= 11.1.0, < 11.1.7+security-01 | 11.1.7+security-01 |
github.com/grafana/grafanaGo | >= 11.2.0, < 11.2.2+security-01 | 11.2.2+security-01 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-q99m-qcv4-fpm7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-9264ghsaADVISORY
- github.com/grafana/grafana/pull/81666ghsaWEB
- grafana.com/blog/2024/10/17/grafana-security-release-critical-severity-fix-for-cve-2024-9264ghsaWEB
- grafana.com/security/security-advisories/cve-2024-9264ghsaWEB
- security.netapp.com/advisory/ntap-20250314-0007ghsaWEB
- grafana.com/security/security-advisories/cve-2024-9264/mitre
News mentions
0No linked articles in our index yet.