HomeGrafanaCVE-2023-4822

CVE-2023-4822

MEDIUM
6.7CVSS
Published: 2023-10-16
Updated: 2025-06-16
AI Analysis

Description

Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
Attack Vector
network
Complexity
low
Privileges
high
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
low
Weaknesses
CWE-269NVD-CWE-noinfo

Metadata

Primary Vendor
GRAFANA
Published
10/16/2023
Last Modified
6/16/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

grafana : grafanagrafana : grafanagrafana : grafanagrafana : grafanagrafana : grafana

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-4822 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com