CVE-2023-0507
Grafana vulnerability analysis and mitigation

Overview

Grafana had a stored XSS (Cross-Site Scripting) vulnerability affecting the core plugin GeoMap, identified as CVE-2023-0507. The vulnerability was discovered during an internal audit and publicly disclosed on February 28, 2023. The issue affected Grafana versions starting from the 8.1 branch, where map attributions weren't properly sanitized, allowing arbitrary JavaScript execution in the context of the authorized user (Grafana Advisory, NVD).

Technical details

The vulnerability stems from improper sanitization of map attributions in the GeoMap plugin, which allowed storing unsanitized HTML that could execute arbitrary JavaScript code. The vulnerability requires an attacker to have Editor role privileges to exploit by changing a panel to include malicious map attribution content. The issue has been assigned a CVSS score of 5.4 (Medium) with the vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N (NetApp Advisory).

Impact

Successful exploitation of this vulnerability could lead to vertical privilege escalation, where a user with Editor role could potentially change passwords for users with Admin role if the admin user views a compromised dashboard. This could result in unauthorized access to sensitive information and the ability to add or modify data within the Grafana instance (Grafana Advisory).

Mitigation and workarounds

Users are advised to upgrade to Grafana versions 8.5.21, 9.2.13, or 9.3.8 or later to receive the security fix. These versions properly sanitize map attributions in the GeoMap plugin to prevent stored XSS attacks (Grafana Advisory).

Additional resources


SourceThis report was generated using AI

Related Grafana vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-41115CRITICAL10
  • GrafanaGrafana
  • grafana-fips-12.2
NoYesNov 21, 2025
CVE-2025-66031HIGH8.7
  • JavaScriptJavaScript
  • kibana-8.18
NoYesNov 26, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • dotnet5.0-build-reference-packages
NoYesDec 01, 2025
CVE-2025-66035HIGH7.7
  • JavaScriptJavaScript
  • @angular/common
NoYesNov 26, 2025
CVE-2025-66030MEDIUM6.3
  • JavaScriptJavaScript
  • kubeflow-pipelines
NoYesNov 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management