CVE-2025-3454: Grafana's datasource proxy API allows authorization checks to be bypassed
(updated )
This vulnerability in Grafana’s datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.
Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources.
The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.
References
- github.com/advisories/GHSA-9j65-rv5x-4vrf
- github.com/grafana/grafana
- github.com/grafana/grafana/blob/be8d153dc33734caba4f617ff571d18253e68fa0/CHANGELOG.md
- grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454
- grafana.com/security/security-advisories/cve-2025-3454
- nvd.nist.gov/vuln/detail/CVE-2025-3454
Code Behaviors & Features
Detect and mitigate CVE-2025-3454 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →