Description
The OpenFeature feature toggle evaluation endpoint reads unbounded values into memory, which can cause out-of-memory crashes.
Published: 2026-03-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Out‑of‑Memory
Action: Patch
AI Analysis

Impact

The vulnerability exists in the OpenFeature feature toggle evaluation endpoint of Grafana. When the endpoint receives data, it reads input values without imposing limits, allocating memory proportional to the received size. An attacker can send an excessively large payload, causing the process to consume excessive memory and crash due to out‑of‑memory. The primary impact is a denial‑of‑service that can disrupt the availability of a Grafana instance, owing to the weakness in input validation and resource exhaustion.

Affected Systems

Grafana’s OpenFeature feature toggle evaluation API is affected. The CNA lists only the vendor and product; no specific version range is provided. Administrators should review the installed Grafana versions for susceptibility, especially those including the OpenFeature endpoint, and ensure they are updated to a version that limits input size or otherwise fixes the memory handling.

Risk and Exploitability

The CVSS base score of 7.5 indicates moderate to high severity. The exploitability score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting no publicly available exploits yet. Nonetheless, the attack vector can be remote via the HTTP API, requiring network access to the Grafana server. Because the flaw leads to an out‑of‑memory condition rather than code execution, the risk is primarily availability rather than confidentiality or integrity.

Generated by OpenCVE AI on March 27, 2026 at 15:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Grafana patch that implements bounds checking on the OpenFeature evaluation endpoint.
  • Verify that the deployed Grafana version contains the fix.
  • If a patch is not immediately available, block or rate‑limit large payloads to the API through a reverse proxy or firewall to mitigate denial‑of‑service risk.
  • Regularly monitor Grafana logs for memory exhaustion events and keep documentation of applied patches.

Generated by OpenCVE AI on March 27, 2026 at 15:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-770

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description The OpenFeature feature toggle evaluation endpoint reads unbounded values into memory, which can cause out-of-memory crashes.
Title OpenFeature evaluation API reads input data with no bounds
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published:

Updated: 2026-03-27T14:43:46.925Z

Reserved: 2026-02-24T14:30:17.727Z

Link: CVE-2026-27880

cve-icon Vulnrichment

Updated: 2026-03-27T14:40:50.982Z

cve-icon NVD

Status : Received

Published: 2026-03-27T15:16:51.323

Modified: 2026-03-27T15:16:51.323

Link: CVE-2026-27880

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-27T14:12:20Z

Links: CVE-2026-27880 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:28:41Z

Weaknesses