Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.
History

Thu, 09 Oct 2025 07:30:00 +0000

Type Values Removed Values Added
Description Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.
Title Arbitrary Code Execution in Grafana Image Renderer Plugin
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published:

Updated: 2025-10-09T07:18:15.819Z

Reserved: 2025-10-09T06:20:49.088Z

Link: CVE-2025-11539

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-09T08:15:38.813

Modified: 2025-10-09T08:15:38.813

Link: CVE-2025-11539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.