{"api_version":"1","generated_at":"2026-04-23T00:42:16+00:00","cve":"CVE-2022-31130","urls":{"html":"https://cve.report/CVE-2022-31130","api":"https://cve.report/api/cve/CVE-2022-31130.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31130","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31130"},"summary":{"title":"CVE-2022-31130","description":"Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-10-13 23:15:00","updated_at":"2022-10-17 13:31:00"},"problem_types":["CWE-522"],"metrics":[],"references":[{"url":"https://github.com/grafana/grafana/releases/tag/v9.1.8","name":"https://github.com/grafana/grafana/releases/tag/v9.1.8","refsource":"MISC","tags":[],"title":"Release 9.1.8 (2022-10-11) · grafana/grafana · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177","name":"https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177","refsource":"MISC","tags":[],"title":"Security: Make proxy endpoints not leak sensitive HTTP headers · grafana/grafana@4dd56e4 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc","name":"https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc","refsource":"CONFIRM","tags":[],"title":"Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins · Advisory · grafana/grafana · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f","name":"https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f","refsource":"MISC","tags":[],"title":"Plugins: Make proxy endpoints not leak sensitive HTTP headers · grafana/grafana@9da278c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31130","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31130","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"31130","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-31130","qid":"161102","title":"Oracle Enterprise Linux Security Update for grafana security and enhancement update (ELSA-2023-6420)"},{"cve":"CVE-2022-31130","qid":"242309","title":"Red Hat Update for grafana (RHSA-2023:6420)"},{"cve":"CVE-2022-31130","qid":"690988","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for grafana (6f6c9420-6297-11ed-9ca2-6c3be5272acd)"},{"cve":"CVE-2022-31130","qid":"753668","title":"SUSE Enterprise Linux Security Update for grafana (SUSE-SU-2023:0362-1)"},{"cve":"CVE-2022-31130","qid":"941404","title":"AlmaLinux Security Update for grafana (ALSA-2023:6420)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-31130","STATE":"PUBLIC","TITLE":"Grafana data source and plugin proxy endpoints leaking authentication tokens to some destination plugins"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"grafana","version":{"version_data":[{"version_value":"< 8.5.14"},{"version_value":">= 9.0.0, < 9.1.8"}]}}]},"vendor_name":"grafana"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"}]}]},"references":{"reference_data":[{"name":"https://github.com/grafana/grafana/releases/tag/v9.1.8","refsource":"MISC","url":"https://github.com/grafana/grafana/releases/tag/v9.1.8"},{"name":"https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc","refsource":"CONFIRM","url":"https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc"},{"name":"https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177","refsource":"MISC","url":"https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177"},{"name":"https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f","refsource":"MISC","url":"https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f"}]},"source":{"advisory":"GHSA-jv32-5578-pxjc","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-10-13 23:15:00","lastModifiedDate":"2022-10-17 13:31:00","problem_types":["CWE-522"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.1.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionEndExcluding":"8.5.14","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}