CVE-2025-2703
Description
The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability.
A user with Editor permissions is able to modify such a panel in order to make it execute arbitrary JavaScript.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Grafana XY Chart plugin DOM XSS allows editors to inject arbitrary JavaScript into dashboards, risking session theft and privilege escalation.
Vulnerability
CVE-2025-2703 is a DOM-based cross-site scripting (XSS) vulnerability in the built-in XY Chart plugin of Grafana. The flaw arises because user-supplied content within dashboard panel configurations is not properly sanitized before being rendered in the browser [1]. This allows an attacker to inject arbitrary JavaScript code that executes in the context of another user's session when they view the affected dashboard. The vulnerability was introduced in Grafana version 11.1.0 and affects OSS and Enterprise editions [2].
Exploitation
To exploit this vulnerability, an attacker must be an authenticated user with Editor permissions (or higher) on a Grafana instance. The attacker modifies an XY Chart panel on a dashboard, embedding malicious script payloads into the panel's configuration. When other users—including viewers or administrators—open that dashboard, the injected JavaScript executes in their browser session [1]. No additional user interaction beyond viewing the dashboard is required.
Impact
Successful exploitation enables the attacker to perform arbitrary actions within the victim's session, such as exfiltrating session tokens, accessing or modifying data visible to the victim, creating or deleting dashboard resources, and potentially escalating privileges if a privileged user views the compromised dashboard [1]. Given Grafana's widespread use in enterprise monitoring, this could lead to lateral movement within an organization's observability stack.
Mitigation
Grafana released fixes in versions 11.6.0+security-01, 11.5.3+security-01, 11.4.3+security-01, 11.3.5+security-01, and 11.2.8+security-01 [2]. All Grafana deployments should be upgraded to a patched version. As a best practice, dashboard editor permissions should be restricted to trusted users only [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
19- osv-coords18 versionspkg:bitnami/grafanapkg:rpm/opensuse/grafana&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/prometheus-blackbox_exporter&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/golang-github-prometheus-alertmanager&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/golang-github-prometheus-node_exporter&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/golang-github-prometheus-node_exporter&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/golang-github-prometheus-node_exporter&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/golang-github-prometheus-prometheus&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/golang-github-prometheus-prometheus&distro=SUSE%20Manager%20Client%20Tools%2015pkg:rpm/suse/grafana&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/grafana&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP7pkg:rpm/suse/grafana&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/grafana&distro=SUSE%20Manager%20Client%20Tools%2015pkg:rpm/suse/prometheus-blackbox_exporter&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/prometheus-blackbox_exporter&distro=SUSE%20Manager%20Client%20Tools%2015pkg:rpm/suse/prometheus-blackbox_exporter&distro=SUSE%20Manager%20Client%20Tools%20for%20SLE%20Micro%205pkg:rpm/suse/prometheus-blackbox_exporter&distro=SUSE%20Manager%20Proxy%20Module%204.3pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.3
>= 11.2.0, < 11.5.3+ 17 more
- (no CPE)range: >= 11.2.0, < 11.5.3
- (no CPE)range: < 11.5.5-150200.3.72.2
- (no CPE)range: < 0.26.0-150000.1.27.1
- (no CPE)range: < 0.26.0-1.31.2
- (no CPE)range: < 1.9.1-1.36.2
- (no CPE)range: < 1.9.1-1.36.2
- (no CPE)range: < 1.9.1-1.36.2
- (no CPE)range: < 2.53.4-1.60.2
- (no CPE)range: < 2.53.4-150000.3.62.2
- (no CPE)range: < 11.5.5-150200.3.72.2
- (no CPE)range: < 11.5.5-150200.3.72.2
- (no CPE)range: < 11.5.5-1.79.2
- (no CPE)range: < 11.5.5-150000.1.79.1
- (no CPE)range: < 0.26.0-1.27.1
- (no CPE)range: < 0.26.0-150000.1.27.1
- (no CPE)range: < 0.26.0-150000.1.27.1
- (no CPE)range: < 0.26.0-150000.1.27.1
- (no CPE)range: < 4.3.15.2-150400.3.133.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.