You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|CVE-2026-28390 | No | Caddy terminates TLS; Grafana never processes raw TLS |
317
+
|CVE-2026-22184 | No |`untgz` path — unreachable via dashboard UI |
318
+
|CVE-2026-34040 | No | Moby Docker-client code, not a Grafana HTTP endpoint |
319
+
|CVE-2026-39883 | No | Local PATH-hijack — requires host shell access |
320
+
|CVE-2026-25679 | No |`elasticsearch` plugin internal path — not reachable via dashboard |
321
+
|CVE-2026-27137 | No |`elasticsearch` plugin internal path — not reachable via dashboard |
322
+
|CVE-2026-32280 | No | Go chain-building DoS on outbound TLS — not reachable from public internet |
323
+
|CVE-2026-32282 | No | Local `Root.Chmod` symlink — requires host shell access |
324
+
|CVE-2026-34986 | Not confirmed | JWE bearer token routed to API-key handler in live test; panic requires a code path that calls `jwe.ParseEncrypted()` (e.g. JWT-auth or OIDC flows) |
325
+
326
+
**Overall risk**: CVE-2026-34986 was not confirmed exploitable via simple bearer token
327
+
on this deployment — the API-key auth handler intercepted the request before go-jose
328
+
was called. The upgrade to `grafana/grafana:13.0.0` eliminates the vulnerability at
329
+
its root regardless. The remaining 10 HIGH CVEs have no realistic remote attack path
330
+
in this deployment. No CRITICALs in any version we are now deploying.
0 commit comments