This vulnerability requires specific conditions for exploitation: the Grafana instance must support multiple organizations, the targeted user must be a member of both organizations being switched between, and the attacker must possess knowledge of the organization ID currently being viewed. The more serious vulnerability, CVE-2025-6023, carries a CVSS score of 7.6 and represents a high-severity cross-site scripting (XSS) attack vector. What makes this vulnerability particularly dangerous is that it does not require editor permissions to exploit, and if anonymous access is enabled, the XSS attack becomes immediately viable. However, the open redirect mechanism can potentially be chained with other attacks to achieve XSS, similar to the patterns observed in CVE-2025-6023 and the previous vulnerability CVE-2025-4123. For CVE-2025-6197, administrators can block Grafana URLs beginning with /\ (%2F%5C) in their ingress configuration or limit instances to single organization deployments.
This Cyber News was published on cybersecuritynews.com. Publication date: Sun, 20 Jul 2025 06:15:55 +0000