CVE-2025-11539

Grafana · Grafana Image Renderer plugin, used across multiple Grafana products

A critical remote code execution vulnerability has been identified in the Grafana Image Renderer plugin.

Executive summary

A critical remote code execution vulnerability has been identified in the Grafana Image Renderer plugin. This flaw allows an unauthenticated attacker to write arbitrary files to the server, which can be leveraged to take complete control of the system, leading to potential data theft, service disruption, and further network compromise.

Vulnerability

The vulnerability exists within the /render/csv endpoint of the Grafana Image Renderer. This endpoint fails to properly validate the filePath parameter, creating a path traversal flaw. An unauthenticated remote attacker can exploit this by crafting a request with a malicious filePath value (e.g., using ../ sequences) to write a file to any location on the server's filesystem that the Grafana process has permissions to access. This arbitrary file write capability can be used to upload a web shell, create a cron job, or overwrite system files, ultimately resulting in remote code execution (RCE).

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.9. Successful exploitation would grant an attacker complete control over the server hosting the Grafana instance. This could lead to severe business consequences, including the theft of sensitive data from dashboards and connected data sources, disruption of critical monitoring services, and reputational damage. A compromised server could also be used as a pivot point for attackers to move laterally and compromise other systems within the organization's network.

Remediation

Immediate Action: Immediately update the Grafana Image Renderer plugin to the latest patched version as recommended by the vendor. After patching, review access logs for any signs of prior exploitation attempts targeting the vulnerable endpoint.

Proactive Monitoring: Security teams should actively monitor web server and application logs for suspicious requests to the /render/csv endpoint. Specifically, look for requests where the filePath parameter contains path traversal sequences (../), absolute file paths, or unusual file names. Monitor systems for unexpected file creation in sensitive directories (e.g., web root, /tmp, /etc/cron.d) and for any anomalous processes or network connections originating from the Grafana server.

Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:

  • Use a Web Application Firewall (WAF) to create a rule that blocks requests to the /render/csv endpoint containing path traversal characters.
  • Restrict network access to the Grafana instance, allowing connections only from trusted IP addresses.
  • Ensure the Grafana service is running with the lowest possible user privileges to limit the impact of a successful file write.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical CVSS score of 9.9 and the potential for complete system compromise, this vulnerability represents a significant and immediate threat to the organization. While this vulnerability is not currently listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion. We strongly recommend that organizations prioritize applying the vendor-supplied patch to all affected systems immediately. If patching is delayed, compensating controls should be implemented without delay, and systems should be actively monitored for any signs of compromise.