GHSA-497x-rrr9-68jp

Suggest an improvement
Source
https://github.com/advisories/GHSA-497x-rrr9-68jp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-497x-rrr9-68jp/GHSA-497x-rrr9-68jp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-497x-rrr9-68jp
Aliases
  • CVE-2026-21726
Downstream
Related
Published
2026-04-15T21:30:18Z
Modified
2026-04-17T21:29:12.217271769Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Grafana Loki Path Traversal - CVE-2021-36156 Bypass
Details

The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a single URL decode, by double encoding, an attacker can read files at the Ruler API endpoint /loki/api/v1/rules/{namespace}

Thanks to Prasanth Sundararajan for reporting this vulnerability.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2026-04-15T20:16:34Z",
    "cwe_ids": [
        "CWE-601"
    ],
    "github_reviewed_at": "2026-04-16T21:42:00Z",
    "severity": "MODERATE"
}
References

Affected packages

Go / github.com/grafana/loki/v3

Package

Name
github.com/grafana/loki/v3
View open source insights on deps.dev
Purl
pkg:golang/github.com/grafana/loki/v3

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.4

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-497x-rrr9-68jp/GHSA-497x-rrr9-68jp.json"