In Grafana's alerting system, users with edit permissions for a contact point, specifically the permissions “alert.notifications:write” or “alert.notifications.receivers:test” that are granted as part of the fixed role "Contact Point Writer", which is part of the basic role Editor - can edit contact points created by other users, modify the endpoint URL to a controlled server. By invoking the test functionality, attackers can capture and extract redacted secure settings, such as authentication credentials for third-party services (e.g., Slack tokens). This leads to unauthorized access and potential compromise of external integrations.
References
| Link | Resource |
|---|---|
| https://grafana.com/security/security-advisories/cve-2025-12141/ | Vendor Advisory |
Configurations
History
20 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Grafana
Grafana grafana |
|
| References | () https://grafana.com/security/security-advisories/cve-2025-12141/ - Vendor Advisory | |
| CPE | cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
15 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-15 16:16
Updated : 2026-04-20 20:16
NVD link : CVE-2025-12141
Mitre link : CVE-2025-12141
CVE.ORG link : CVE-2025-12141
JSON object : View
Products Affected
grafana
- grafana
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
