{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:12:35.738","vulnerabilities":[{"cve":{"id":"CVE-2022-39306","sourceIdentifier":"security-advisories@github.com","published":"2022-11-09T22:15:16.303","lastModified":"2024-11-21T07:17:59.950","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds."},{"lang":"es","value":"Grafana es una plataforma de código abierto para monitorización y observabilidad. Las versiones anteriores a 9.2.4 u 8.5.15 en la rama 8.X están sujetas a una validación de entrada incorrecta. Los administradores de Grafana pueden invitar a otros miembros a la organización de la que son administradores. Cuando los administradores agregan miembros a la organización, los usuarios no existentes reciben una invitación por correo electrónico y los miembros existentes se agregan directamente a la organización. Cuando se envía un enlace de invitación, permite a los usuarios registrarse con cualquier nombre de usuario/dirección de correo electrónico que elijan y convertirse en miembros de la organización. Esto introduce una vulnerabilidad que puede utilizarse con intenciones maliciosas. Este problema se solucionó en la versión 9.2.4 y se actualizó a la 8.5.15. No se conocen workarounds alternativos."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.5.15","matchCriteriaId":"0ECEA474-C936-4774-AB72-0446551C3D64"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.2.4","matchCriteriaId":"3E1FE6F4-C2C8-432B-91AF-01A4D4036956"}]}]}],"references":[{"url":"https://github.com/grafana/grafana/security/advisories/GHSA-2x6g-h2hg-rq84","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20221215-0004/","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/grafana/grafana/security/advisories/GHSA-2x6g-h2hg-rq84","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20221215-0004/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}