A high-severity vulnerability, CVE-2025-4123, has been identified in Grafana (versions 8 and above), affecting both Grafana OSS and Grafana Enterprise. This flaw is a combination of an open redirect and path traversal within custom frontend plugin handling, enabling attackers to craft malicious links that redirect users to attacker-controlled sites and execute arbitrary JavaScript (XSS). If the vulnerable Grafana instance has anonymous access enabled, the attack does not require authentication. In environments with the Grafana Image Renderer plugin, exploitation can escalate to a full read Server-Side Request Forgery (SSRF), allowing attackers to access sensitive internal resources and cloud metadata. The risk includes session hijacking, full account takeover, and exposure of internal assets. Grafana Labs has released patched versions addressing this issue, and immediate upgrading is strongly recommended. The IONIX research team successfully reproduced and validated, , as detailed in this post.
References:

