{"api_version":"1","generated_at":"2026-04-22T21:38:49+00:00","cve":"CVE-2023-2801","urls":{"html":"https://cve.report/CVE-2023-2801","api":"https://cve.report/api/cve/CVE-2023-2801.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2801","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2801"},"summary":{"title":"CVE-2023-2801","description":"Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.","state":"PUBLIC","assigner":"security@grafana.com","published_at":"2023-06-06 19:15:00","updated_at":"2023-07-06 19:15:00"},"problem_types":["CWE-662"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20230706-0002/","name":"https://security.netapp.com/advisory/ntap-20230706-0002/","refsource":"MISC","tags":[],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://grafana.com/security/security-advisories/cve-2023-2801/","name":"https://grafana.com/security/security-advisories/cve-2023-2801/","refsource":"MISC","tags":[],"title":"Grafana ds proxy race condition | Grafana Labs","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2801","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2801","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2801","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-2801","qid":"150693","title":"Grafana Race Condition Vulnerability (CVE-2023-2801)"},{"cve":"CVE-2023-2801","qid":"691184","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for grafana (652064ef-056f-11ee-8e16-6c3be5272acd)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2801","ASSIGNER":"security@grafana.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Grafana is an open-source platform for monitoring and observability. \n\nUsing public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.\n\nThe only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly.\n\nThis might enable malicious users to crash Grafana instances through that endpoint.\n\nUsers may upgrade to version 9.4.12 and 9.5.3 to receive a fix.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-820","cweId":"CWE-820"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Grafana","product":{"product_data":[{"product_name":"Grafana","version":{"version_data":[{"version_affected":"<","version_name":"9.4.0","version_value":"9.4.12"},{"version_affected":"<","version_name":"9.5.0","version_value":"9.5.3"}]}},{"product_name":"Grafana Enterprise","version":{"version_data":[{"version_affected":"<","version_name":"9.4.0","version_value":"9.4.12"},{"version_affected":"<","version_name":"9.5.0","version_value":"9.5.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://grafana.com/security/security-advisories/cve-2023-2801/","refsource":"MISC","name":"https://grafana.com/security/security-advisories/cve-2023-2801/"},{"url":"https://security.netapp.com/advisory/ntap-20230706-0002/","refsource":"MISC","name":"https://security.netapp.com/advisory/ntap-20230706-0002/"}]},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-06 19:15:00","lastModifiedDate":"2023-07-06 19:15:00","problem_types":["CWE-662"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.6,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.5.0","versionEndExcluding":"9.5.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.4.0","versionEndExcluding":"9.4.12","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}