Grafana Releases Patch To Fix Zero-day Vulnerability

December 8, 2021

Grafana has released an emergency update to fix a zero-day vulnerability that is being tracked as CVE-2021-43798.

While this addition to previous patches was released to fix the issue, it became necessary after exploits were circulated over Twitter.

Since Proof-of-concept on how to exploit the vulnerability was publicly available Grafana was forced to release a fix. CEV-2021-43798 received a severity of 7.5 and can still be exploited on on-premise servers that have yet to be updated.

CEV-2021-43798 is described as a path traversal flaw that could allow attackers to navigate outside the Grafana folder and go ahead to remotely access restricted locations on the server.

In its explanation, Grafana explained that the root cause of the problem lies in the URL provided for installed plug-ins. According to Grafana, the URL was vulnerable to path traversal attacks. Currently, thousands of Grafana servers are exposed to this attack. Those who cannot install the update should ensure that their servers are not accessible from the public web.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

February 23, 2026 Researchers say they’ve identified a new strain of Android malware that uses Google’s own Gemini AI model more...

February 23, 2026 Texas officials are warning about what could be the largest data breach in U.S. history, with notification more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn