
Cloud Vulnerability DB
A community-led vulnerabilities database
In Grafana, a permission control vulnerability was identified and assigned CVE-2024-8118. The vulnerability affects the alert rule write API endpoint, where incorrect permissions allow users with external alert instance write access to also write alert rules. This vulnerability was first introduced in Grafana v8.5.0 and has been fixed in versions v11.2.1, v11.1.6, v11.0.5, v10.4.9, and v10.3.10 (Grafana Advisory).
The vulnerability has been assigned a CVSS 4.0 Base Score of 5.1 (Medium) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N. The vulnerability is classified under CWE-653 (Improper Isolation or Compartmentalization) (NVD).
The vulnerability allows users who have permission to write external alert instances to gain unauthorized access to write alert rules, potentially compromising the alert configuration system's integrity (CVE).
Users are advised to upgrade to the fixed versions: v11.2.1, v11.1.6, v11.0.5, v10.4.9, or v10.3.10 (Grafana Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."