Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process.
Instances are vulnerable if:
1. The default token ("authToken") is not changed, or is known to the attacker.
2. The attacker can reach the image renderer endpoint.
This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Oct 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16. | |
Title | Arbitrary Code Execution in Grafana Image Renderer Plugin | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GRAFANA
Published:
Updated: 2025-10-09T07:18:15.819Z
Reserved: 2025-10-09T06:20:49.088Z
Link: CVE-2025-11539

No data.

Status : Received
Published: 2025-10-09T08:15:38.813
Modified: 2025-10-09T08:15:38.813
Link: CVE-2025-11539

No data.

No data.