CVE-2022-23552

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23552
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23552.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23552
Aliases
Downstream
Related
Published
2023-01-27T22:59:16Z
Modified
2025-10-21T19:32:36Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Grafana stored XSS in FileUploader component
Details

Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance.

An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the data: scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.

Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/grafana/grafana

Affected ranges

Type
GIT
Repo
https://github.com/grafana/grafana
Events
Type
GIT
Repo
https://github.com/grafana/grafana
Events
Type
GIT
Repo
https://github.com/grafana/grafana
Events