CVE-2026-21726

The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a single URL decode, by double encoding, an attacker can read files at the Ruler API endpoint /loki/api/v1/rules/{namespace} Thanks to Prasanth Sundararajan for reporting this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:grafana:loki:*:*:*:*:*:*:*:*

History

20 Apr 2026, 20:08

Type Values Removed Values Added
First Time Grafana
Grafana loki
CPE cpe:2.3:a:grafana:loki:*:*:*:*:*:*:*:*
References () https://grafana.com/security/security-advisories/cve-2026-21726 - () https://grafana.com/security/security-advisories/cve-2026-21726 - Vendor Advisory

20 Apr 2026, 19:16

Type Values Removed Values Added
CWE CWE-22

15 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 20:16

Updated : 2026-04-20 20:08


NVD link : CVE-2026-21726

Mitre link : CVE-2026-21726

CVE.ORG link : CVE-2026-21726


JSON object : View

Products Affected

grafana

  • loki
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')