{"api_version":"1","generated_at":"2026-04-22T23:31:49+00:00","cve":"CVE-2022-39201","urls":{"html":"https://cve.report/CVE-2022-39201","api":"https://cve.report/api/cve/CVE-2022-39201.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-39201","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-39201"},"summary":{"title":"CVE-2022-39201","description":"Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-10-13 23:15:00","updated_at":"2022-10-19 14:08:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57","name":"https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57","refsource":"MISC","tags":[],"title":"Security: Fix do not forward login cookie in outgoing requests · grafana/grafana@b571acc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/grafana/grafana/releases/tag/v9.1.8","name":"https://github.com/grafana/grafana/releases/tag/v9.1.8","refsource":"MISC","tags":[],"title":"Release 9.1.8 (2022-10-11) · grafana/grafana · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9","name":"https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9","refsource":"MISC","tags":[],"title":"Security: Fix do not forward login cookie in outgoing requests · grafana/grafana@c658816 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr","name":"https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr","refsource":"CONFIRM","tags":[],"title":"Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins · Advisory · grafana/grafana · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-39201","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39201","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"39201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"5.0.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"5.0.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"5.0.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"5.0.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"5.0.0","cpe7":"beta4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"39201","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"5.0.0","cpe7":"beta5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-39201","qid":"161102","title":"Oracle Enterprise Linux Security Update for grafana security and enhancement update (ELSA-2023-6420)"},{"cve":"CVE-2022-39201","qid":"242309","title":"Red Hat Update for grafana (RHSA-2023:6420)"},{"cve":"CVE-2022-39201","qid":"690990","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for grafana (6877e164-6296-11ed-9ca2-6c3be5272acd)"},{"cve":"CVE-2022-39201","qid":"753668","title":"SUSE Enterprise Linux Security Update for grafana (SUSE-SU-2023:0362-1)"},{"cve":"CVE-2022-39201","qid":"941404","title":"AlmaLinux Security Update for grafana (ALSA-2023:6420)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-39201","STATE":"PUBLIC","TITLE":"Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"grafana","version":{"version_data":[{"version_value":">= v5.0.0-beta1, < 8.5.14"},{"version_value":">= 9.0.0, < 9.1.8"}]}}]},"vendor_name":"grafana"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"}]}]},"references":{"reference_data":[{"name":"https://github.com/grafana/grafana/releases/tag/v9.1.8","refsource":"MISC","url":"https://github.com/grafana/grafana/releases/tag/v9.1.8"},{"name":"https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr","refsource":"CONFIRM","url":"https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr"},{"name":"https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57","refsource":"MISC","url":"https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57"},{"name":"https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9","refsource":"MISC","url":"https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9"}]},"source":{"advisory":"GHSA-x744-mm8v-vpgr","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-10-13 23:15:00","lastModifiedDate":"2022-10-19 14:08:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:5.0.0:beta1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:5.0.0:beta2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:5.0.0:beta3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:5.0.0:beta4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:5.0.0:beta5:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.1.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:5.0.0:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.1","versionEndExcluding":"8.5.14","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}