Skip to content

Commit 522f58e

Browse files
committed
1 parent 08dc98f commit 522f58e

1 file changed

Lines changed: 20 additions & 2 deletions

File tree

advisories/unreviewed/2026/03/GHSA-736h-475m-xhjc/GHSA-736h-475m-xhjc.json

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,37 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-736h-475m-xhjc",
4-
"modified": "2026-03-27T15:30:25Z",
4+
"modified": "2026-03-27T18:31:26Z",
55
"published": "2026-03-27T15:30:25Z",
66
"aliases": [
77
"CVE-2026-27876"
88
],
9+
"summary": "Critical RCE on Grafana using viewer privileges ",
910
"details": "A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead to a remote arbitrary code execution impact (RCE). This is enabled by a feature in Grafana (OSS), so all users are always recommended to update to avoid future attack vectors going this path.\n\nOnly instances with the sqlExpressions feature toggle enabled are vulnerable.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": ""
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
1735
"references": [
1836
{
1937
"type": "ADVISORY",

0 commit comments

Comments
 (0)