🔐 CVE Alert

CVE-2025-11539

CRITICAL 9.9

Arbitrary Code Execution in Grafana Image Renderer Plugin

CVSS Score
9.9
EPSS Score
0.0%
EPSS Percentile
0th

Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.

CWE CWE-94
Vendor grafana
Product grafana-image-renderer
Ecosystems
Industries
Technology
Published Oct 9, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for grafana grafana-image-renderer

Be the first to know when new critical vulnerabilities affecting grafana grafana-image-renderer are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Grafana / grafana-image-renderer
1.0.0 ≤ 4.0.16

References

NVD ↗ CVE.org ↗ EPSS Data ↗
grafana.com: https://grafana.com/security/security-advisories/cve-2025-11539/ github.com: https://github.com/grafana/grafana-image-renderer/releases/tag/v4.0.17

Credits

Callum Carney Wouter ter Maat