InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
Technology

Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation

November 21, 2025 2 Min Read
Share
Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
SHARE

Grafana has released a security update to address a maximum severity security flaw that could allow privilege escalation and user impersonation under certain configurations.

Vulnerabilities are tracked as follows CVE-2025-41115the CVSS score is 10.0. It resides within the System for Cross-Domain Identity Management (SCIM) component, which enables automated user provisioning and management. It was first introduced in April 2025 and is currently in public preview.

“In Grafana version 12.x with SCIM provisioning enabled and configured, a vulnerability in user ID handling could allow a malicious or compromised SCIM client to provision a user with a numeric externalId, which could override the internal user ID and potentially lead to impersonation and privilege escalation,” said Vardan Torosyan of Grafana.

However, a successful exploit depends on whether both conditions are met.

  • EnableSCIM feature flag is set to true
  • (auth.scim) block’s user_sync_enabled configuration option is set to true

This drawback affects Grafana Enterprise versions 12.0.0 to 12.2.1. This issue is resolved in the following versions of the software.

  • Grafana Enterprise 12.0.6+Security-01
  • Grafana Enterprise 12.1.3+Security-01
  • Grafana Enterprise 12.2.1+Security-01
  • Grafana Enterprise 12.3.0

“Grafana maps SCIM externalId directly to internal user.uid, so a number (e.g. ‘1’) can be interpreted as an internal numeric user ID,” Torosyan said. “In certain cases, this could result in newly provisioned users being treated as existing internal accounts, such as administrators, which could lead to impersonation and privilege escalation.”

According to the analysis and observation platform, the vulnerability was discovered internally on November 4, 2025 during audit and testing. Given the severity of the issue, we recommend that users apply the patch as soon as possible to reduce potential risks.

See also  Critical RSC bug in React and Next.js allows unauthenticated remote code execution
Share This Article
Twitter Copy Link
Previous Article From Borderlands 4 to Expedition 33, Fanatical's Black Friday prices are cheaper than Steam From Borderlands 4 to Expedition 33, Fanatical’s Black Friday prices are cheaper than Steam
Next Article LAFD records show no signs of "cold tail" again at Lachman Fire, as interim chief claimed LAFD records show no signs of “cold tail” again at Lachman Fire, as interim chief claimed

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

New bug in Oracle E-Business Suite could allow hackers to access data without logging in
Technology

New bug in Oracle E-Business Suite could allow hackers to access data without logging in

2 Min Read
Quantum Hacks to AI Defenses
Technology

From quantum hacks to AI defense – an expert guide to building unbreakable cyber resilience

7 Min Read
Nation-state hackers deploy new Airstalk malware in suspected supply chain attack
Technology

Nation-state hackers deploy new Airstalk malware in suspected supply chain attack

5 Min Read
Malicious VSX extension 'SleepyDuck' uses Ethereum to keep command server alive
Technology

Malicious VSX extension ‘SleepyDuck’ uses Ethereum to keep command server alive

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?