๐Ÿ” CVE Alert

CVE-2026-21725

LOW 2.6

Authorization Bypass via TOCTOU in Grafana Datasource Deletion by Name

CVSS Score
2.6
EPSS Score
0.0%
EPSS Percentile
8th

A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data sources be re-deleted without permission to do so. This requires several very stringent conditions to be met: - The attacker must have admin access to the specific datasource prior to its first deletion. - Upon deletion, all steps within the attack must happen within the next 30 seconds and on the same pod of Grafana. - The attacker must delete the datasource, then someone must recreate it. - The new datasource must not have the attacker as an admin. - The new datasource must have the same UID as the prior datasource. These are randomised by default. - The datasource can now be re-deleted by the attacker. - Once 30 seconds are up, the attack is spent and cannot be repeated. - No datasource with any other UID can be attacked.

Vendor grafana
Product grafana
Ecosystems
Industries
Technology
Published Feb 25, 2026
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for grafana grafana

Be the first to know when new low vulnerabilities affecting grafana grafana are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Grafana / Grafana
v11.0.0 < v12.4.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
grafana.com: https://grafana.com/security/security-advisories/cve-2026-21725