{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-4123","title":"Title"},{"category":"description","text":"A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.\n\nThe default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-4123","url":"https://www.suse.com/security/cve/CVE-2025-4123"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1243714 for CVE-2025-4123","url":"https://bugzilla.suse.com/1243714"},{"category":"external","summary":"Advisory link for RHSA-2025:7893","url":"https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001551.html"},{"category":"external","summary":"Advisory link for RHSA-2025:7894","url":"https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001149.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2025:01985-1","url":"https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2025:15179-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NUT27N46T3RCYUKKZDD2PQ3C7X7OURLR/"}],"title":"SUSE CVE CVE-2025-4123","tracking":{"current_release_date":"2026-03-16T17:34:21Z","generator":{"date":"2025-05-21T00:51:36Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-4123","initial_release_date":"2025-05-21T00:51:36Z","revision_history":[{"date":"2025-05-21T00:51:36Z","number":"2","summary":"Current version"},{"date":"2025-05-23T01:59:15Z","number":"3","summary":"Current version"},{"date":"2025-05-28T03:22:48Z","number":"4","summary":"Current version"},{"date":"2025-05-31T01:29:23Z","number":"5","summary":"Current version"},{"date":"2025-06-01T00:51:25Z","number":"6","summary":"Current version"},{"date":"2025-06-02T01:05:24Z","number":"7","summary":"Current version"},{"date":"2025-06-11T02:56:17Z","number":"8","summary":"Current version"},{"date":"2025-06-12T03:44:11Z","number":"9","summary":"Current version"},{"date":"2025-06-19T03:29:40Z","number":"10","summary":"Current version"},{"date":"2025-06-25T23:48:50Z","number":"11","summary":"Current version"},{"date":"2025-06-29T23:22:10Z","number":"12","summary":"Current version"},{"date":"2025-11-03T00:52:52Z","number":"13","summary":"Current version"},{"date":"2026-01-23T01:00:40Z","number":"14","summary":"unknown changes"},{"date":"2026-03-11T17:37:01Z","number":"15","summary":"unknown changes"},{"date":"2026-03-16T17:34:21Z","number":"16","summary":"unknown changes"}],"status":"interim","version":"16"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Liberty Linux 8","product":{"name":"SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8","product_identification_helper":{"cpe":"cpe:/o:suse:sll:8"}}},{"category":"product_name","name":"SUSE Liberty Linux 9","product":{"name":"SUSE Liberty Linux 9","product_id":"SUSE Liberty Linux 9","product_identification_helper":{"cpe":"cpe:/o:suse:sll:9"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 16.0","product":{"name":"SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0","product_identification_helper":{"cpe":"cpe:/o:suse:sles:16:16.0:server"}}},{"category":"product_name","name":"SUSE Manager Server 4.3","product":{"name":"SUSE Manager Server 4.3","product_id":"SUSE Manager Server 4.3","product_identification_helper":{"cpe":"cpe:/o:suse:suse-manager-server:4.3"}}},{"category":"product_name","name":"SUSE Multi-Linux Manager Client Tools for SLE 12","product":{"name":"SUSE Multi-Linux Manager Client Tools for SLE 12","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 12","product_identification_helper":{"cpe":"cpe:/o:suse:multi-linux-managertools-sle:12"}}},{"category":"product_name","name":"SUSE Multi-Linux Manager Client Tools for SLE 15","product":{"name":"SUSE Multi-Linux Manager Client Tools for SLE 15","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 15","product_identification_helper":{"cpe":"cpe:/o:suse:multi-linux-managertools-sle:15"}}},{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"govulncheck-vulndb-0.0.20250527T204717-1.1","product":{"name":"govulncheck-vulndb-0.0.20250527T204717-1.1","product_id":"govulncheck-vulndb-0.0.20250527T204717-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/govulncheck-vulndb@0.0.20250527T204717-1.1?upstream=govulncheck-vulndb-0.0.20250527T204717-1.1.src.rpm"}}},{"category":"product_version","name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product":{"name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product_id":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product_identification_helper":{"purl":"pkg:rpm/suse/govulncheck-vulndb@0.0.20250814T182633-160000.1.2?upstream=govulncheck-vulndb-0.0.20250814T182633-160000.1.2.src.rpm"}}},{"category":"product_version","name":"grafana","product":{"name":"grafana","product_id":"grafana","product_identification_helper":{"cpe":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/grafana@?upstream=grafana.src.rpm"}}},{"category":"product_version","name":"grafana-10.2.6-13.el9_6","product":{"name":"grafana-10.2.6-13.el9_6","product_id":"grafana-10.2.6-13.el9_6","product_identification_helper":{"cpe":"cpe:2.3:a:grafana:grafana:10.2.6:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/grafana@10.2.6-13.el9_6?upstream=grafana-10.2.6-13.el9_6.src.rpm"}}},{"category":"product_version","name":"grafana-11.6.1+security01-1.1","product":{"name":"grafana-11.6.1+security01-1.1","product_id":"grafana-11.6.1+security01-1.1","product_identification_helper":{"cpe":"cpe:2.3:a:grafana:grafana:11.6.1+security01:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/grafana@11.6.1+security01-1.1?upstream=grafana-11.6.1+security01-1.1.src.rpm"}}},{"category":"product_version","name":"grafana-9.2.10-23.el8_10","product":{"name":"grafana-9.2.10-23.el8_10","product_id":"grafana-9.2.10-23.el8_10","product_identification_helper":{"cpe":"cpe:2.3:a:grafana:grafana:9.2.10:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/grafana@9.2.10-23.el8_10?upstream=grafana-9.2.10-23.el8_10.src.rpm"}}},{"category":"product_version","name":"grafana-selinux-10.2.6-13.el9_6","product":{"name":"grafana-selinux-10.2.6-13.el9_6","product_id":"grafana-selinux-10.2.6-13.el9_6","product_identification_helper":{"purl":"pkg:rpm/suse/grafana-selinux@10.2.6-13.el9_6"}}},{"category":"product_version","name":"grafana-selinux-9.2.10-23.el8_10","product":{"name":"grafana-selinux-9.2.10-23.el8_10","product_id":"grafana-selinux-9.2.10-23.el8_10","product_identification_helper":{"purl":"pkg:rpm/suse/grafana-selinux@9.2.10-23.el8_10"}}},{"category":"product_version","name":"release-notes-susemanager-4.3.15.2-150400.3.133.1","product":{"name":"release-notes-susemanager-4.3.15.2-150400.3.133.1","product_id":"release-notes-susemanager-4.3.15.2-150400.3.133.1","product_identification_helper":{"purl":"pkg:rpm/suse/release-notes-susemanager@4.3.15.2-150400.3.133.1?upstream=release-notes-susemanager-4.3.15.2-150400.3.133.1.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"grafana-9.2.10-23.el8_10 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:grafana-9.2.10-23.el8_10"},"product_reference":"grafana-9.2.10-23.el8_10","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"grafana-selinux-9.2.10-23.el8_10 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:grafana-selinux-9.2.10-23.el8_10"},"product_reference":"grafana-selinux-9.2.10-23.el8_10","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"grafana-10.2.6-13.el9_6 as component of SUSE Liberty Linux 9","product_id":"SUSE Liberty Linux 9:grafana-10.2.6-13.el9_6"},"product_reference":"grafana-10.2.6-13.el9_6","relates_to_product_reference":"SUSE Liberty Linux 9"},{"category":"default_component_of","full_product_name":{"name":"grafana-selinux-10.2.6-13.el9_6 as component of SUSE Liberty Linux 9","product_id":"SUSE Liberty Linux 9:grafana-selinux-10.2.6-13.el9_6"},"product_reference":"grafana-selinux-10.2.6-13.el9_6","relates_to_product_reference":"SUSE Liberty Linux 9"},{"category":"default_component_of","full_product_name":{"name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2 as component of SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2"},"product_reference":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","relates_to_product_reference":"SUSE Linux Enterprise Server 16.0"},{"category":"default_component_of","full_product_name":{"name":"release-notes-susemanager-4.3.15.2-150400.3.133.1 as component of SUSE Manager Server 4.3","product_id":"SUSE Manager Server 4.3:release-notes-susemanager-4.3.15.2-150400.3.133.1"},"product_reference":"release-notes-susemanager-4.3.15.2-150400.3.133.1","relates_to_product_reference":"SUSE Manager Server 4.3"},{"category":"default_component_of","full_product_name":{"name":"govulncheck-vulndb-0.0.20250527T204717-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250527T204717-1.1"},"product_reference":"govulncheck-vulndb-0.0.20250527T204717-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"grafana-11.6.1+security01-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1"},"product_reference":"grafana-11.6.1+security01-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Multi-Linux Manager Client Tools for SLE 12","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 12:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Multi-Linux Manager Client Tools for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Multi-Linux Manager Client Tools for SLE 15","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 15:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Multi-Linux Manager Client Tools for SLE 15"}]},"vulnerabilities":[{"cve":"CVE-2025-4123","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-4123"}],"notes":[{"category":"general","text":"A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.\n\nThe default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.","title":"CVE description"}],"product_status":{"known_not_affected":["SUSE Multi-Linux Manager Client Tools for SLE 12:grafana","SUSE Multi-Linux Manager Client Tools for SLE 15:grafana"],"recommended":["SUSE Liberty Linux 8:grafana-9.2.10-23.el8_10","SUSE Liberty Linux 8:grafana-selinux-9.2.10-23.el8_10","SUSE Liberty Linux 9:grafana-10.2.6-13.el9_6","SUSE Liberty Linux 9:grafana-selinux-10.2.6-13.el9_6","SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","SUSE Manager Server 4.3:release-notes-susemanager-4.3.15.2-150400.3.133.1","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250527T204717-1.1","openSUSE Tumbleweed:grafana-11.6.1+security01-1.1"]},"references":[{"category":"external","summary":"CVE-2025-4123","url":"https://www.suse.com/security/cve/CVE-2025-4123"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1243714 for CVE-2025-4123","url":"https://bugzilla.suse.com/1243714"},{"category":"external","summary":"Advisory link for RHSA-2025:7893","url":"https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001551.html"},{"category":"external","summary":"Advisory link for RHSA-2025:7894","url":"https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001149.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2025:01985-1","url":"https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2025:15179-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NUT27N46T3RCYUKKZDD2PQ3C7X7OURLR/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 8:grafana-9.2.10-23.el8_10","SUSE Liberty Linux 8:grafana-selinux-9.2.10-23.el8_10","SUSE Liberty Linux 9:grafana-10.2.6-13.el9_6","SUSE Liberty Linux 9:grafana-selinux-10.2.6-13.el9_6","SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","SUSE Manager Server 4.3:release-notes-susemanager-4.3.15.2-150400.3.133.1","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250527T204717-1.1","openSUSE Tumbleweed:grafana-11.6.1+security01-1.1"]}],"scores":[{"cvss_v3":{"baseScore":7.6,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L","version":"3.1"},"products":["SUSE Liberty Linux 8:grafana-9.2.10-23.el8_10","SUSE Liberty Linux 8:grafana-selinux-9.2.10-23.el8_10","SUSE Liberty Linux 9:grafana-10.2.6-13.el9_6","SUSE Liberty Linux 9:grafana-selinux-10.2.6-13.el9_6","SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","SUSE Manager Server 4.3:release-notes-susemanager-4.3.15.2-150400.3.133.1","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250527T204717-1.1","openSUSE Tumbleweed:grafana-11.6.1+security01-1.1"]}],"threats":[{"category":"impact","date":"2025-05-15T04:00:16Z","details":"important"}],"title":"CVE-2025-4123"}]}