{"api_version":"1","generated_at":"2026-04-22T21:38:58+00:00","cve":"CVE-2026-21724","urls":{"html":"https://cve.report/CVE-2026-21724","api":"https://cve.report/api/cve/CVE-2026-21724.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-21724","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-21724"},"summary":{"title":"Missing Protected-field Authorization in Provisioning Contact Points API","description":"A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the required alert.notifications.receivers.protected:write permission.","state":"PUBLISHED","assigner":"GRAFANA","published_at":"2026-03-26 21:17:03","updated_at":"2026-04-14 01:00:10"},"problem_types":["CWE-285","CWE-285 CWE-285 Improper Authorization"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"security@grafana.com","type":"Secondary","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","data":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://grafana.com/security/security-advisories/cve-2026-21724","name":"https://grafana.com/security/security-advisories/cve-2026-21724","refsource":"security@grafana.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-21724","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21724","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 12.3.1 12.3.6 semver","platforms":["OnPrem"]},{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 12.2.2 12.2.8 semver","platforms":["OnPrem"]},{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 12.1.5 12.1.10 semver","platforms":["OnPrem"]},{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 11.6.9 11.6.14 semver","platforms":["OnPrem"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"21724","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"21724","cve":"CVE-2026-21724","epss":"0.000280000","percentile":"0.079850000","score_date":"2026-04-05","updated_at":"2026-04-06 00:05:32"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-21724","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-27T13:42:43.732342Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"CWE-285 Improper Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-27T13:56:12.761Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["OnPrem"],"product":"Grafana OSS","vendor":"Grafana","versions":[{"lessThan":"12.3.6","status":"affected","version":"12.3.1","versionType":"semver"},{"lessThan":"12.2.8","status":"affected","version":"12.2.2","versionType":"semver"},{"lessThan":"12.1.10","status":"affected","version":"12.1.5","versionType":"semver"},{"lessThan":"11.6.14","status":"affected","version":"11.6.9","versionType":"semver"}]}],"datePublic":"2026-03-25T22:00:37.352Z","descriptions":[{"lang":"en","value":"A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the required alert.notifications.receivers.protected:write permission."}],"metrics":[{"cvssV3_1":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}}],"providerMetadata":{"dateUpdated":"2026-04-09T13:49:30.847Z","orgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","shortName":"GRAFANA"},"references":[{"tags":["vendor-advisory"],"url":"https://grafana.com/security/security-advisories/cve-2026-21724"}],"source":{"discovery":"BUG_BOUNTY"},"title":"Missing Protected-field Authorization in Provisioning Contact Points API","x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","assignerShortName":"GRAFANA","cveId":"CVE-2026-21724","datePublished":"2026-03-26T20:06:18.829Z","dateReserved":"2026-01-05T09:26:06.214Z","dateUpdated":"2026-04-09T13:49:30.847Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-26 21:17:03","lastModifiedDate":"2026-04-14 01:00:10","problem_types":["CWE-285","CWE-285 CWE-285 Improper Authorization"],"metrics":{"cvssMetricV31":[{"source":"security@grafana.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"11.6.9","versionEndExcluding":"11.6.14","matchCriteriaId":"B333C05C-D6CC-4292-B54B-5D081FE92C6E"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.1.5","versionEndExcluding":"12.1.10","matchCriteriaId":"252E74A8-BC0A-420D-A937-84AAE46C8BDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.2.2","versionEndExcluding":"12.2.8","matchCriteriaId":"409163A6-7B0A-4E46-AD47-620AFC841A9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.3.1","versionEndExcluding":"12.3.6","matchCriteriaId":"875BA099-9D0F-4DC0-80DF-5F35D06097AC"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"21724","Ordinal":"1","Title":"Missing Protected-field Authorization in Provisioning Contact Po","CVE":"CVE-2026-21724","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"21724","Ordinal":"1","NoteData":"A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the required alert.notifications.receivers.protected:write permission.","Type":"Description","Title":"Missing Protected-field Authorization in Provisioning Contact Po"}]}}}