Article Details

Original Article Text

Click to Toggle View

Grafana warns of max severity admin spoofing vulnerability. Grafana Labs is warning of a maximum severity vulnerability (CVE-2025-41115) in its Enterprise product that can be exploited to treat new users as administrators or for privilege escalation. The issue is only exploitable when SCIM (System for Cross-domain Identity Management) provisioning is enabled and configured. Specifically, both 'enableSCIM' feature flag and 'user_sync_enabled' options must be set to true to allow a malicious or compromised SCIM client to provision a user with a numeric externalId that maps to an internal account, including administrators. The externalId is a SCIM bookkeeping attribute used by the identity provider to track users. Because Grafana mapped this value directly to its internal user.uid, a numeric externalId such as \ "1\" could be interpreted as an existing internal account, enabling impersonation or privilege escalation. According to Grafana's documentation, SCIM provisioning is currently in 'Public Preview' and there is limited support available. Because of this, adoption of the feature may not be widespread. Grafana is a data visualization and monitoring platform used by a broad spectrum of organizations, from startups to Fortune 500 companies, for turning metrics, logs, and other operational data into dashboards, alerts, and analytics. "In specific cases this could allow the newly provisioned user to be treated as an existing internal account, such as the Admin, leading to potential impersonation or privilege escalation" - Grafana Labs CVE-2025-41115 impacts Grafana Enterprise versions between 12.0.0 and 12.2.1 (when SCIM is enabled). Grafana OSS users aren't impacted, while Grafana Cloud services, including Amazon Managed Grafana and Azure Managed Grafana, have already received the patches. Administrators of self-managed installations can address the risk by applying one of the following updates: "If your instance is vulnerable, we strongly recommend upgrading to one of the patched versions as soon as possible," warns Grafana Labs. The flaw was discovered during internal auditing on November 4, and a security update was introduced roughly 24 hours later. During that time, Grafana Labs investigated and determined that the flaw had not been exploited in Grafana Cloud. The public release of the security update and the accompanying bulletin followed on November 19. Grafana users are recommended to apply available patches as soon as possible or change the configuration (disable SCIM) to close potential exploitation opportunities. Last month, GreyNoise reported unusually elevated scanning activity targeting an old path traversal flaw in Grafana, which, as the researchers have noted previously, could be used for mapping exposed instances in preparation for the disclosure of a new flaw. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

VULNERABILITIES // Grafana Enterprise Vulnerability Allows Potential Admin Privilege Escalation

Grafana Labs identified a critical vulnerability (CVE-2025-41115) in its Enterprise product, enabling potential admin privilege escalation when SCIM provisioning is enabled.

The flaw is exploitable if both 'enableSCIM' and 'user_sync_enabled' options are true, allowing compromised SCIM clients to provision users with admin rights.

Grafana's internal audit discovered the issue, and a security update was released within 24 hours, with no exploitation detected in Grafana Cloud services.

The vulnerability affects Grafana Enterprise versions 12.0.0 to 12.2.1, while Grafana OSS users remain unaffected. Grafana Cloud services have already been patched.

Administrators of self-managed installations are urged to apply the patches or disable SCIM to mitigate the risk of exploitation.

The vulnerability's discovery comes amid increased scanning activity for older flaws, suggesting potential preparatory actions for exploiting new vulnerabilities.

Grafana's swift response highlights the importance of proactive internal audits and timely patch management to safeguard against privilege escalation threats.