CVE-2025-41117

Source
https://cve.org/CVERecord?id=CVE-2025-41117
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-41117.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-41117
Aliases
Downstream
Published
2026-02-12T09:16:07.630Z
Modified
2026-02-28T06:40:34.575663Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field.

Only datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.

References

Affected packages

Git / github.com/grafana/grafana

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-41117.json"