CVE-2025-12141

In Grafana's alerting system, users with edit permissions for a contact point, specifically the permissions “alert.notifications:write” or “alert.notifications.receivers:test” that are granted as part of the fixed role "Contact Point Writer", which is part of the basic role Editor - can edit contact points created by other users, modify the endpoint URL to a controlled server. By invoking the test functionality, attackers can capture and extract redacted secure settings, such as authentication credentials for third-party services (e.g., Slack tokens). This leads to unauthorized access and potential compromise of external integrations.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*

History

20 Apr 2026, 20:16

Type Values Removed Values Added
First Time Grafana
Grafana grafana
References () https://grafana.com/security/security-advisories/cve-2025-12141/ - () https://grafana.com/security/security-advisories/cve-2025-12141/ - Vendor Advisory
CPE cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

15 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 16:16

Updated : 2026-04-20 20:16


NVD link : CVE-2025-12141

Mitre link : CVE-2025-12141

CVE.ORG link : CVE-2025-12141


JSON object : View

Products Affected

grafana

  • grafana
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor