CVE-2025-11539
Arbitrary Code Execution in Grafana Image Renderer Plugin
CVSS Score
9.9
EPSS Score
0.0%
EPSS Percentile
0th
Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.
| CWE | CWE-94 |
| Vendor | grafana |
| Product | grafana-image-renderer |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 9, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for grafana grafana-image-renderer
Be the first to know when new critical vulnerabilities affecting grafana grafana-image-renderer are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Grafana / grafana-image-renderer
1.0.0 ≤ 4.0.16
References
Credits
Callum Carney Wouter ter Maat