Looking for the vulnerability index of Invicti's legacy products?
Grafana Open Redirect (CVE-2025-4123) - Vulnerability Database

Grafana Open Redirect (CVE-2025-4123)

Description

Grafana contains an open redirect vulnerability (CVE-2025-4123) that allows attackers to construct malicious URLs that redirect authenticated or unauthenticated users to attacker-controlled domains. This occurs due to insufficient validation of redirect parameters within the application. The vulnerability can be exploited as a standalone phishing vector or chained with other attack techniques such as Server-Side Request Forgery (SSRF) to access internal resources, or as part of an Account Takeover (ATO) attack flow by intercepting authentication tokens during the redirect process.

Remediation

Apply security patches immediately by upgrading to the latest patched version of Grafana as specified in the official Grafana security advisory for CVE-2025-4123. Review the Grafana security blog post for version-specific patch information and affected version ranges.

Mitigation steps:
1. Identify your current Grafana version and compare against the affected versions listed in the security advisory
2. Schedule and perform an upgrade to the patched version during your next maintenance window
3. If immediate patching is not possible, implement compensating controls such as Web Application Firewall (WAF) rules to validate and restrict redirect parameters
4. Review application logs for suspicious redirect attempts or unusual URL patterns that may indicate exploitation attempts
5. Educate users about the risks of clicking on untrusted Grafana links, especially those received via email or external sources

Related Vulnerabilities