{"api_version":"1","generated_at":"2026-04-22T17:48:21+00:00","cve":"CVE-2026-33375","urls":{"html":"https://cve.report/CVE-2026-33375","api":"https://cve.report/api/cve/CVE-2026-33375.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-33375","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-33375"},"summary":{"title":"Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS","description":"The Grafana MSSQL data source plugin contains a logic flaw that allows a low-privileged user (Viewer) to bypass API restrictions and trigger a catastrophic Out-Of-Memory (OOM) memory exhaustion, crashing the host container.","state":"PUBLISHED","assigner":"GRAFANA","published_at":"2026-03-26 21:17:05","updated_at":"2026-03-31 19:01:30"},"problem_types":["CWE-400","CWE-400 CWE-400 Uncontrolled Resource Consumption"],"metrics":[{"version":"3.1","source":"security@grafana.com","type":"Secondary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","data":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"url":"https://grafana.com/security/security-advisories/cve-2026-33375","name":"https://grafana.com/security/security-advisories/cve-2026-33375","refsource":"security@grafana.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-33375","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33375","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 11.6.0 11.6.14+security-01 semver","platforms":["OnPrem"]},{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 12.1.0 12.1.10+security-01 semver","platforms":["OnPrem"]},{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 12.2.0 12.2.8+security-01 semver","platforms":["OnPrem"]},{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 12.3.0 12.3.6+security-01 semver","platforms":["OnPrem"]},{"source":"CNA","vendor":"Grafana","product":"Grafana OSS","version":"affected 12.4.0 12.4.2 semver","platforms":["OnPrem"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"33375","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"grafana","cpe5":"grafana","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-33375","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-27T14:39:23.654250Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-27T14:40:37.122Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["OnPrem"],"product":"Grafana OSS","vendor":"Grafana","versions":[{"lessThan":"11.6.14+security-01","status":"affected","version":"11.6.0","versionType":"semver"},{"lessThan":"12.1.10+security-01","status":"affected","version":"12.1.0","versionType":"semver"},{"lessThan":"12.2.8+security-01","status":"affected","version":"12.2.0","versionType":"semver"},{"lessThan":"12.3.6+security-01","status":"affected","version":"12.3.0","versionType":"semver"},{"lessThan":"12.4.2","status":"affected","version":"12.4.0","versionType":"semver"}]}],"datePublic":"2026-03-26T12:52:32.117Z","descriptions":[{"lang":"en","value":"The Grafana MSSQL data source plugin contains a logic flaw that allows a low-privileged user (Viewer) to bypass API restrictions and trigger a catastrophic Out-Of-Memory (OOM) memory exhaustion, crashing the host container."}],"metrics":[{"cvssV3_1":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"providerMetadata":{"dateUpdated":"2026-03-27T14:28:53.648Z","orgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","shortName":"GRAFANA"},"references":[{"tags":["vendor-advisory"],"url":"https://grafana.com/security/security-advisories/cve-2026-33375"}],"source":{"discovery":"BUG_BOUNTY"},"title":"Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS","x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","assignerShortName":"GRAFANA","cveId":"CVE-2026-33375","datePublished":"2026-03-26T20:05:52.564Z","dateReserved":"2026-03-19T07:55:06.977Z","dateUpdated":"2026-03-27T14:40:37.122Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-26 21:17:05","lastModifiedDate":"2026-03-31 19:01:30","problem_types":["CWE-400","CWE-400 CWE-400 Uncontrolled Resource Consumption"],"metrics":{"cvssMetricV31":[{"source":"security@grafana.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"11.6.0","versionEndExcluding":"11.6.14","matchCriteriaId":"D46EB6A0-D0D1-4209-B7B5-3BACD4ADAF9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.10","matchCriteriaId":"C0016311-847E-438D-A1C7-B03005867EAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.2.0","versionEndExcluding":"12.2.8","matchCriteriaId":"96AAB185-6025-4B8F-A07E-CABD00DDC295"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.3.0","versionEndExcluding":"12.3.6","matchCriteriaId":"581CC6E2-4E52-4E13-804B-8D944BA03D15"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.4.0","versionEndExcluding":"12.4.2","matchCriteriaId":"A699040D-CF1F-474F-A01D-49C6E62C026B"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"33375","Ordinal":"1","Title":"Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to ","CVE":"CVE-2026-33375","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"33375","Ordinal":"1","NoteData":"The Grafana MSSQL data source plugin contains a logic flaw that allows a low-privileged user (Viewer) to bypass API restrictions and trigger a catastrophic Out-Of-Memory (OOM) memory exhaustion, crashing the host container.","Type":"Description","Title":"Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to "}]}}}