Medium severity6.5NVD Advisory· Published Apr 15, 2026· Updated Apr 20, 2026
CVE-2025-12141
CVE-2025-12141
Description
In Grafana's alerting system, users with edit permissions for a contact point, specifically the permissions “alert.notifications:write” or “alert.notifications.receivers:test” that are granted as part of the fixed role "Contact Point Writer", which is part of the basic role Editor - can edit contact points created by other users, modify the endpoint URL to a controlled server. By invoking the test functionality, attackers can capture and extract redacted secure settings, such as authentication credentials for third-party services (e.g., Slack tokens). This leads to unauthorized access and potential compromise of external integrations.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- grafana.com/security/security-advisories/cve-2025-12141/nvdVendor Advisory
News mentions
3- PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud SystemsThe Hacker News · May 7, 2026
- Open-source MCP server monitoring for Python appsHelp Net Security · May 7, 2026
- 13th April – Threat Intelligence ReportCheck Point Research · Apr 13, 2026