{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T19:25:40.211","vulnerabilities":[{"cve":{"id":"CVE-2026-21722","sourceIdentifier":"security@grafana.com","published":"2026-02-12T09:16:08.763","lastModified":"2026-02-27T15:16:27.600","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Public dashboards with annotations enabled did not limit their annotation timerange to the locked timerange of the public dashboard. This means one could read the entire history of annotations visible on the specific dashboard, even those outside the locked timerange.\n\nThis did not leak any annotations that would not otherwise be visible on the public dashboard."},{"lang":"es","value":"Los paneles públicos con anotaciones habilitadas no limitaban su rango de tiempo de anotaciones al rango de tiempo bloqueado del panel público. Esto significaba que se podía leer todo el historial de anotaciones visibles en el panel específico, incluso aquellas fuera del rango de tiempo bloqueado.\n\nEsto no filtraba ninguna anotación que de otro modo no sería visible en el panel público."}],"metrics":{"cvssMetricV31":[{"source":"security@grafana.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"9.3.0","versionEndExcluding":"11.6.10","matchCriteriaId":"FC76AD1C-B27B-406D-A117-4A77843DB73E"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.1.6","matchCriteriaId":"D5BEDACC-A177-4E74-B3A7-262519FEE855"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"12.2.0","versionEndIncluding":"12.2.4","matchCriteriaId":"1A9AE662-36F4-4B97-8B4C-78E93587D100"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","versionStartIncluding":"12.3.0","versionEndIncluding":"12.3.2","matchCriteriaId":"97D48B2B-3863-409D-BC93-778972C04854"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:11.6.10:-:*:*:*:*:*:*","matchCriteriaId":"B6CAA7A9-874F-4C6A-B955-4DFBA2834355"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:12.1.6:-:*:*:*:*:*:*","matchCriteriaId":"47FF05E9-65D7-43E8-93B0-111BA4708041"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:12.2.4:-:*:*:*:*:*:*","matchCriteriaId":"4CF2D10C-CEE9-4D8C-9D46-F38DE3540FB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:12.3.2:-:*:*:*:*:*:*","matchCriteriaId":"63FB712A-04AC-42FD-AC3C-1384932B662E"}]}]}],"references":[{"url":"https://grafana.com/security/security-advisories/cve-2026-21722","source":"security@grafana.com","tags":["Broken Link"]}]}}]}