CVE-2023-1387
Grafana vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Grafana versions 9.1.0 through versions prior to 9.5.1, 9.5.0, 9.4.9, 9.3.13, and 9.2.17, identified as CVE-2023-1387. The vulnerability relates to JWT token leakage when using the URL login feature. When the 'url_login' configuration option is enabled (though disabled by default), JWT tokens passed as query parameters could be leaked to data sources during proxy requests (Grafana Advisory).

Technical details

The vulnerability occurs in Grafana's JWT authentication mechanism, specifically in the URL login flow. When using URL LOGIN functionality, authentication tokens are passed as query parameters using the 'auth_token' parameter. While the token is used for authentication to Grafana, it is not removed from the proxied request and instead gets forwarded to the target data source. This implementation flaw exists in the URL token retrieval process and the backend service handling (GitHub Advisory). The vulnerability has been assigned a CVSS score of 7.5 (HIGH) with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NetApp Advisory).

Impact

The successful exploitation of this vulnerability could lead to unauthorized access to Grafana with the privileges of the victim user. If an attacker has access to the data source, they could capture the leaked JWT token and use it to authenticate to Grafana, potentially accessing sensitive information for as long as the JWT remains valid. The JWT itself may also contain sensitive information as it is an ID_TOKEN (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Grafana versions 9.5.1, 9.5.0, 9.4.9, 9.3.13, and 9.2.17. Users are advised to upgrade to these patched versions to address the security issue (Grafana Advisory).

Additional resources


SourceThis report was generated using AI

Related Grafana vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66031HIGH8.7
  • JavaScriptJavaScript
  • reaper
NoYesNov 26, 2025
CVE-2025-12816HIGH8.6
  • JavaScriptJavaScript
  • kibana-9.0
NoYesNov 25, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • grafana
NoYesDec 01, 2025
CVE-2025-66035HIGH7.7
  • JavaScriptJavaScript
  • grafana-loki
NoYesNov 26, 2025
CVE-2025-66030MEDIUM6.3
  • JavaScriptJavaScript
  • node-node-forge
NoYesNov 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management