Medium severity5.0NVD Advisory· Published Jun 2, 2025· Updated Apr 15, 2026
CVE-2025-3454
CVE-2025-3454
Description
This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.
Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.
The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/grafana/grafanaGo | >= 0.0.0-20210414170620-dadccdda06e6, < 0.0.0-20250424191517-1f707d16ed5d | 0.0.0-20250424191517-1f707d16ed5d |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-9j65-rv5x-4vrfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-3454ghsaADVISORY
- github.com/grafana/grafana/blob/be8d153dc33734caba4f617ff571d18253e68fa0/CHANGELOG.mdghsaWEB
- grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454ghsaWEB
- grafana.com/security/security-advisories/cve-2025-3454ghsaWEB
- grafana.com/security/security-advisories/cve-2025-3454/nvd
News mentions
0No linked articles in our index yet.