{"api_version":"1","generated_at":"2026-04-23T02:37:51+00:00","cve":"CVE-2022-35957","urls":{"html":"https://cve.report/CVE-2022-35957","api":"https://cve.report/api/cve/CVE-2022-35957.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-35957","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-35957"},"summary":{"title":"CVE-2022-35957","description":"Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-09-20 23:15:00","updated_at":"2023-11-07 03:49:00"},"problem_types":["CWE-290"],"metrics":[],"references":[{"url":"https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q","name":"https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q","refsource":"CONFIRM","tags":[],"title":"Escalation from admin to server admin when auth proxy is used · Advisory · grafana/grafana · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20221215-0001/","name":"https://security.netapp.com/advisory/ntap-20221215-0001/","refsource":"CONFIRM","tags":[],"title":"September 2022 Grafana Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYU5C2RITLHVZSTCWNGQWA6KSPYNXM2H/","name":"FEDORA-2022-2eb4418018","refsource":"FEDORA","tags":[],"title":"503 Backend fetch failed","mime":"text/html","httpstatus":"503","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYU5C2RITLHVZSTCWNGQWA6KSPYNXM2H/","name":"FEDORA-2022-2eb4418018","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: grafana-9.0.9-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-35957","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35957","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"35957","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"35957","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-35957","qid":"150576","title":"Grafana Authentication Bypass Vulnerability (CVE-2022-35957)"},{"cve":"CVE-2022-35957","qid":"160619","title":"Oracle Enterprise Linux Security Update for grafana security and enhancement update (ELSA-2023-2167)"},{"cve":"CVE-2022-35957","qid":"241453","title":"Red Hat Update for grafana (RHSA-2023:2167)"},{"cve":"CVE-2022-35957","qid":"502510","title":"Alpine Linux Security Update for grafana"},{"cve":"CVE-2022-35957","qid":"690942","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for grafana (95e6e6ca-3986-11ed-8e0c-6c3be5272acd)"},{"cve":"CVE-2022-35957","qid":"752995","title":"SUSE Enterprise Linux Security Update for grafana (SUSE-SU-2022:4428-1)"},{"cve":"CVE-2022-35957","qid":"754116","title":"SUSE Enterprise Linux Security Update for SUSE Manager Client Tools (SUSE-SU-2023:2578-1)"},{"cve":"CVE-2022-35957","qid":"941046","title":"AlmaLinux Security Update for grafana (ALSA-2023:2167)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-35957","STATE":"PUBLIC","TITLE":"Authentication Bypass in Grafana via auth proxy allowing escalation from admin to server admin"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"grafana","version":{"version_data":[{"version_value":"> 9.0.0, < 9.1.6"},{"version_value":"< 8.5.13"}]}}]},"vendor_name":"grafana"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/"}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.6,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-290: Authentication Bypass by Spoofing"}]}]},"references":{"reference_data":[{"name":"https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q","refsource":"CONFIRM","url":"https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q"},{"refsource":"FEDORA","name":"FEDORA-2022-2eb4418018","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYU5C2RITLHVZSTCWNGQWA6KSPYNXM2H/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20221215-0001/","url":"https://security.netapp.com/advisory/ntap-20221215-0001/"}]},"source":{"advisory":"GHSA-ff5c-938w-8c9q","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-09-20 23:15:00","lastModifiedDate":"2023-11-07 03:49:00","problem_types":["CWE-290"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.6,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.7,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.0","versionEndExcluding":"9.1.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.0.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionEndExcluding":"8.5.13","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}