Description
The grafanacubism-panel plugin allows use of cubism.js in Grafana. In 0.1.2 and earlier, the panel's zoom-link handler passes a dashboard-editor-supplied URL directly to window.location.assign() / window.open() with no scheme validation. An attacker with dashboard Editor privileges can set the link to a javascript: URI; when any Viewer drag-zooms on the panel, the payload executes in the Grafana origin.
Published: 2026-03-11
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The grafanacubism-panel plugin for Grafana allows an editor to supply a URL that is passed directly to window.location.assign() or window.open() without scheme validation during a panel zoom action, enabling the injection of a javascript: URI that is executed in the Grafana domain when any viewer drags‑zooms the panel, resulting in stored cross‑site scripting (CWE‑79). An attacker can run arbitrary JavaScript in the context of the Grafana UI, potentially accessing session cookies, making authenticated API requests or modifying page content.

Affected Systems

Affected vendors and products are listed as ekacnet:grafanacubism-panel. The vulnerability applies to all releases of the plugin dated 0.1.2 and earlier, regardless of Grafana major version. Users deploying this 0.1.2‑level plugin must assess whether the zoom‑link feature is active and whether they assign editor roles to untrusted accounts.

Risk and Exploitability

The CVSS score of 7.6 indicates a high severity. EPSS is below 1%, suggesting low current exploitation probability, and the vulnerability is not catalogued in CISA's Known Exploited Vulnerabilities list. The attack requires an attacker who already has dashboard‑editor privileges; the exploit flows from the editor setting a javascript: link to a viewer dragging‑zooming the panel. Users with broader view access could eventually suffer impact if an editor misconfigures the plugin.

Generated by OpenCVE AI on March 17, 2026 at 22:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade grafanacubism-panel to a patched version (e.g., 0.1.3 or later) if one is available from the vendor.
  • If no patch is available yet, remove or disable the zoom‑link handler or constrain dashboard‑editor rights to trusted personnel.
  • Alternatively, uninstall the grafanacubism‑panel plugin until the vendor releases a fix.

Generated by OpenCVE AI on March 17, 2026 at 22:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ekacnet:grafanacubism-panel:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ekacnet
Ekacnet grafanacubism-panel
Vendors & Products Ekacnet
Ekacnet grafanacubism-panel

Wed, 11 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description The grafanacubism-panel plugin allows use of cubism.js in Grafana. In 0.1.2 and earlier, the panel's zoom-link handler passes a dashboard-editor-supplied URL directly to window.location.assign() / window.open() with no scheme validation. An attacker with dashboard Editor privileges can set the link to a javascript: URI; when any Viewer drag-zooms on the panel, the payload executes in the Grafana origin.
Title grafanacubism-panel : Stored XSS via javascript: URL in panel zoom link (Editor → Viewer)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}


Subscriptions

Ekacnet Grafanacubism-panel
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T19:29:56.170Z

Reserved: 2026-03-10T22:02:38.855Z

Link: CVE-2026-32117

cve-icon Vulnrichment

Updated: 2026-03-12T19:29:53.270Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T22:16:32.473

Modified: 2026-03-17T21:02:11.437

Link: CVE-2026-32117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:56Z

Weaknesses