{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T10:00:16.468","vulnerabilities":[{"cve":{"id":"CVE-2024-6322","sourceIdentifier":"security@grafana.com","published":"2024-08-20T18:15:09.900","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource."},{"lang":"es","value":"El control de acceso a las fuentes de datos de complementos protegidos por el campo json ReqActions de plugin.json se omite si al usuario o a la cuenta de servicio se le concede acceso asociado a cualquier otra fuente de datos, ya que la verificación de ReqActions no se centró en cada fuente de datos específica. La cuenta debe tener acceso de consulta previo a la fuente de datos afectada."}],"metrics":{"cvssMetricV31":[{"source":"security@grafana.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":2.7}]},"weaknesses":[{"source":"security@grafana.com","type":"Secondary","description":[{"lang":"en","value":"CWE-266"}]}],"references":[{"url":"https://grafana.com/security/security-advisories/cve-2024-6322/","source":"security@grafana.com"}]}}]}