{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T04:05:33.392","vulnerabilities":[{"cve":{"id":"CVE-2026-33375","sourceIdentifier":"security@grafana.com","published":"2026-03-26T21:17:05.573","lastModified":"2026-03-31T19:01:30.800","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Grafana MSSQL data source plugin contains a logic flaw that allows a low-privileged user (Viewer) to bypass API restrictions and trigger a catastrophic Out-Of-Memory (OOM) memory exhaustion, crashing the host container."},{"lang":"es","value":"El plugin de fuente de datos de Grafana MSSQL contiene un fallo lógico que permite a un usuario con pocos privilegios (Visor) eludir las restricciones de la API y desencadenar un agotamiento catastrófico de la memoria por Out-Of-Memory (OOM), lo que provoca la caída del contenedor anfitrión."}],"metrics":{"cvssMetricV31":[{"source":"security@grafana.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"11.6.0","versionEndExcluding":"11.6.14","matchCriteriaId":"D46EB6A0-D0D1-4209-B7B5-3BACD4ADAF9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.10","matchCriteriaId":"C0016311-847E-438D-A1C7-B03005867EAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.2.0","versionEndExcluding":"12.2.8","matchCriteriaId":"96AAB185-6025-4B8F-A07E-CABD00DDC295"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.3.0","versionEndExcluding":"12.3.6","matchCriteriaId":"581CC6E2-4E52-4E13-804B-8D944BA03D15"},{"vulnerable":true,"criteria":"cpe:2.3:a:grafana:grafana:*:*:*:*:-:*:*:*","versionStartIncluding":"12.4.0","versionEndExcluding":"12.4.2","matchCriteriaId":"A699040D-CF1F-474F-A01D-49C6E62C026B"}]}]}],"references":[{"url":"https://grafana.com/security/security-advisories/cve-2026-33375","source":"security@grafana.com","tags":["Vendor Advisory"]}]}}]}