VYPR
Critical severityNVD Advisory· Published Oct 18, 2024· Updated Mar 14, 2025

Grafana SQL Expressions allow for remote code execution

CVE-2024-9264

Description

The SQL Expressions experimental feature of Grafana allows for the evaluation of duckdb queries containing user input. These queries are insufficiently sanitized before being passed to duckdb, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The duckdb binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/grafana/grafanaGo
>= 11.0.0, < 11.0.6+security-0111.0.6+security-01
github.com/grafana/grafanaGo
>= 11.1.0, < 11.1.7+security-0111.1.7+security-01
github.com/grafana/grafanaGo
>= 11.2.0, < 11.2.2+security-0111.2.2+security-01

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.