Description
The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization‑internal privilege escalation.
Published: 2026-01-27
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation within a Grafana organization
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the Dashboard Permissions API, which fails to enforce the intended dashboard scope when validating permission modifications. The API only checks for the generic dashboards.permissions:* action rather than verifying that the target dashboard belongs to the same namespace. As a result, a user granted permission‑management rights on one dashboard can read and alter the permissions of any other dashboard in the same organization. The consequence is a trusted‑user privilege escalation that allows an internal attacker to gain unauthorized read or modify access to other dashboards, potentially exposing sensitive metrics or configuration data. This weakness maps to CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-863 (Improper Enforcement of Restriction on Use of Privilege‑Escalating Functions).

Affected Systems

All Grafana installations affected by this advisory, including the community edition and the enterprise edition of Grafana. The problem affects any deployed instance where dashboards.permissions:* scopes are granted, regardless of the Grafana version listed in the advisory. No specific version range is enumerated in the CNA data, so administrators should assume all current and older releases are vulnerable until patched.

Risk and Exploitability

The CVSS score of 8.1 signals a high severity, reflecting the ability of an attacker to elevate privileges without additional exploits. The EPSS score is below 1%, suggesting that active exploitation is rare or not observed at the time of scoring. The vulnerability is not listed in the CISA KEV catalog, indicating no widespread, publicly available exploits are known. Likely attack vectors involve internal users or compromised accounts that invoke the guarded API endpoints, potentially through Grafana’s own web interface or API clients. Exploitation would require the attacker to first obtain a legitimate user session or credentials for a user who has dashboards.permissions:* rights, and then target other dashboards within the organization.

Generated by OpenCVE AI on April 15, 2026 at 17:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest patched release of Grafana, which corrects the dashboard scope validation in the permissions API.
  • Revoke dashboards.permissions:* rights from users who do not require that level of privilege, applying the principle of least privilege.
  • Review and tighten dashboard permission scopes to ensure that permission changes are only allowed within the intended dashboard’s context, and monitor for anomalous permission‑management activity in Grafana logs.

Generated by OpenCVE AI on April 15, 2026 at 17:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:11.6.9:-:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:12.0.8:-:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:12.1.5:-:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:12.2.3:-:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:12.3.0:*:*:*:*:*:*:*
cpe:2.3:a:grafana:grafana:12.3.1:-:*:*:*:*:*:*

Thu, 26 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863

Thu, 12 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
References

Thu, 29 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-639
References
Metrics threat_severity

None

threat_severity

Important


Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Grafana
Grafana grafana
Grafana grafana Enterprise
Vendors & Products Grafana
Grafana grafana
Grafana grafana Enterprise

Tue, 27 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
Description The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization‑internal privilege escalation.
Title Dashboard Permissions Scope Bypass Enables Cross‑Dashboard Privilege Escalation
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Grafana Grafana Grafana Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published:

Updated: 2026-04-24T08:00:51.154Z

Reserved: 2026-01-05T09:26:06.214Z

Link: CVE-2026-21721

cve-icon Vulnrichment

Updated: 2026-01-27T15:26:51.354Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T09:15:48.640

Modified: 2026-04-20T17:28:19.960

Link: CVE-2026-21721

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-27T09:07:55Z

Links: CVE-2026-21721 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:00:15Z

Weaknesses