{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T23:32:09.727","vulnerabilities":[{"cve":{"id":"CVE-2022-39201","sourceIdentifier":"security-advisories@github.com","published":"2022-10-13T23:15:10.850","lastModified":"2024-11-21T07:17:46.560","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds."},{"lang":"es","value":"Grafana es una plataforma de código abierto de observabilidad y visualización de datos. A partir de la versión 5.0.0-beta1 y versiones anteriores a 8.5.14 y 9.1.8, Grafana podía filtrar la cookie de autenticación de usuarios a los plugins. La vulnerabilidad afecta a los endpoints de la fuente de datos y del proxy del plugin bajo determinadas condiciones. El plugin de destino podría recibir la cookie de autenticación de Grafana de un usuario. Las versiones 9.1.8 y 8.5.14 contienen un parche para este problema. No se presentan mitigaciones conocidas"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.1","versionEndExcluding":"8.5.14","matchCriteriaId":"149266FC-7D6C-4AB9-851C-F63549510405"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.1.8","matchCriteriaId":"E8E1ACC7-F43B-4395-A1FD-44CAEB43430D"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:5.0.0:-:*:*:*:*:*:*","matchCriteriaId":"7D0F0AF7-BCA9-4FF3-BD21-01E7A129A30E"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:5.0.0:beta1:*:*:*:*:*:*","matchCriteriaId":"9109F31C-C109-48D0-A928-D5E61B6A9547"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:5.0.0:beta2:*:*:*:*:*:*","matchCriteriaId":"60242F49-9899-4B4A-BD2B-99EF2B7DD22F"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:5.0.0:beta3:*:*:*:*:*:*","matchCriteriaId":"98551C43-BD4C-40CD-92C5-6A3005022CF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:5.0.0:beta4:*:*:*:*:*:*","matchCriteriaId":"E76F5633-7F85-4162-BA13-6F1D887ECE83"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:5.0.0:beta5:*:*:*:*:*:*","matchCriteriaId":"FF03FBD9-5AA0-4171-9EC7-84BFBCBE48D4"}]}]}],"references":[{"url":"https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/releases/tag/v9.1.8","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/releases/tag/v9.1.8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}