HomeGrafanaCVE-2023-2183

CVE-2023-2183

MEDIUM
4.1CVSS
Published: 2023-06-06
Updated: 2025-02-13
AI Analysis

Description

Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
changed
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-284CWE-862

Metadata

Primary Vendor
GRAFANA
Published
6/6/2023
Last Modified
2/13/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

grafana : grafanagrafana : grafanagrafana : grafanagrafana : grafanagrafana : grafana

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-2183 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com