Critical SCIM Flaw in Grafana Enables Privilege Escalation and Impersonation
Summary
Hide ▲
Show ▼
Grafana has patched a critical vulnerability (CVE-2025-41115) in its SCIM component, which could allow privilege escalation or user impersonation. The flaw affects Grafana Enterprise versions 12.0.0 to 12.2.1 and was discovered internally on November 4, 2025. The vulnerability is exploitable only if specific SCIM-related configurations are enabled. Grafana OSS users are not impacted, and Grafana Cloud services have already received the patches. The flaw was discovered during internal auditing, and a security update was introduced roughly 24 hours later, with the public release following on November 19, 2025.
Timeline
-
21.11.2025 17:40 2 articles · 1d ago
Grafana Patches Critical SCIM Flaw Enabling Privilege Escalation
Grafana has released security updates to address a critical vulnerability (CVE-2025-41115) in its SCIM component. The flaw, discovered internally on November 4, 2025, allows privilege escalation or user impersonation if specific SCIM-related configurations are enabled. Affected versions include Grafana Enterprise 12.0.0 to 12.2.1, and patches are available in versions 12.0.6+security-01, 12.1.3+security-01, 12.2.1+security-01, and 12.3.0. The flaw was discovered during internal auditing, and a security update was introduced roughly 24 hours later, with the public release following on November 19, 2025. Grafana OSS users are not impacted, and Grafana Cloud services have already received the patches.
Show sources
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation — thehackernews.com — 21.11.2025 17:40
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
Information Snippets
-
The vulnerability, tracked as CVE-2025-41115, has a CVSS score of 10.0.
First reported: 21.11.2025 17:402 sources, 2 articlesShow sources
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation — thehackernews.com — 21.11.2025 17:40
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
The flaw resides in the SCIM component, which allows automated user provisioning and management.
First reported: 21.11.2025 17:402 sources, 2 articlesShow sources
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation — thehackernews.com — 21.11.2025 17:40
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
Exploitation requires the enableSCIM feature flag and user_sync_enabled config option to be set to true.
First reported: 21.11.2025 17:402 sources, 2 articlesShow sources
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation — thehackernews.com — 21.11.2025 17:40
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
Affected versions include Grafana Enterprise 12.0.0 to 12.2.1.
First reported: 21.11.2025 17:402 sources, 2 articlesShow sources
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation — thehackernews.com — 21.11.2025 17:40
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
The vulnerability was discovered internally during an audit and testing on November 4, 2025.
First reported: 21.11.2025 17:402 sources, 2 articlesShow sources
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation — thehackernews.com — 21.11.2025 17:40
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
The externalId is a SCIM bookkeeping attribute used by the identity provider to track users.
First reported: 21.11.2025 19:581 source, 1 articleShow sources
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
Grafana mapped the externalId directly to its internal user.uid, allowing a numeric externalId such as "1" to be interpreted as an existing internal account.
First reported: 21.11.2025 19:581 source, 1 articleShow sources
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
SCIM provisioning is in 'Public Preview' with limited support, potentially limiting widespread adoption.
First reported: 21.11.2025 19:581 source, 1 articleShow sources
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
Grafana OSS users are not impacted by this vulnerability.
First reported: 21.11.2025 19:581 source, 1 articleShow sources
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
Grafana Cloud services, including Amazon Managed Grafana and Azure Managed Grafana, have already received the patches.
First reported: 21.11.2025 19:581 source, 1 articleShow sources
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
The flaw was discovered during internal auditing on November 4, 2025, and a security update was introduced roughly 24 hours later.
First reported: 21.11.2025 19:581 source, 1 articleShow sources
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
-
The public release of the security update and the accompanying bulletin followed on November 19, 2025.
First reported: 21.11.2025 19:581 source, 1 articleShow sources
- Grafana warns of max severity admin spoofing vulnerability — www.bleepingcomputer.com — 21.11.2025 19:58
Similar Happenings
Unauthenticated access vulnerability in Oracle E-Business Suite Configurator
A critical vulnerability in Oracle E-Business Suite (EBS) allows unauthenticated attackers to access sensitive data via HTTP. The flaw, CVE-2025-61884, affects versions 12.2.3 through 12.2.14 and has a CVSS score of 7.5. CISA has confirmed that the vulnerability is being exploited in attacks and has added it to its Known Exploited Vulnerabilities catalog. Oracle has issued an emergency security update and patch, but exploitation in the wild has been reported. The vulnerability is in the Runtime UI component and could lead to unauthorized access to critical data. Oracle has silently fixed the vulnerability after it was actively exploited and a proof-of-concept exploit was leaked by the ShinyHunters extortion group. This development follows recent disclosures of zero-day exploitation in EBS software, attributed to a group with ties to the Clop ransomware group. The Clop group has been involved in major data theft campaigns targeting zero-days in Accellion FTA, GoAnywhere MFT, Cleo, and MOVEit Transfer.
Unpatched Ivanti Endpoint Manager Vulnerabilities Disclosed by ZDI
Thirteen unpatched vulnerabilities in Ivanti Endpoint Manager have been disclosed by Trend Micro’s Zero Day Initiative (ZDI). One flaw allows local privilege escalation, while the remaining 12 enable remote code execution (RCE). The vulnerabilities were reported to Ivanti in November 2024 and June 2025, respectively. Ivanti has not yet released patches for these high-severity defects, which have CVSS scores ranging from 7.2 to 8.8. The vulnerabilities affect various components and methods within Ivanti Endpoint Manager, including the AgentPortal service, Report_RunPatch, MP_Report_Run2, DBDR, and others. Exploitation of these flaws requires authentication for most, but one RCE vulnerability can be exploited with admin credentials or by convincing a user to open a malicious file. ZDI advises restricting interaction with the product as the primary mitigation strategy. Ivanti has acknowledged the issues but has not provided a public statement on the delay in patching.
Active Exploitation of Multiple Critical Vulnerabilities in Gladinet and TrioFox
Active exploitation of critical vulnerabilities in Gladinet's CentreStack and TrioFox products continues. The zero-day vulnerability, CVE-2025-11371, is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. This flaw affects all versions prior to and including 16.7.10368.56560. The vulnerability has been exploited to retrieve the machine key from the application Web.config file, enabling remote code execution via a ViewState deserialization vulnerability. Three customers have been impacted so far. A patch for the zero-day vulnerability CVE-2025-11371 is now available in CentreStack version 16.10.10408.56683. Users are advised to upgrade to this version or, if upgrading is not possible, disable the "temp" handler within the Web.config file for UploadDownloadProxy to mitigate the risk. The vendor, Gladinet, has been notified and is working on a fix. The vulnerability was detected by researchers at Huntress on September 27, 2025. The flaw was exploited to obtain a machine key and execute code remotely. The attack used an older deserialization vulnerability (CVE-2025-30406) to achieve remote code execution (RCE) through ViewState. The mitigations will impact some functionality of the platform but prevent exploitation of CVE-2025-11371. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-11371 to its Known Exploited Vulnerabilities (KEV) catalog on November 5, 2025, citing evidence of active exploitation. Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary fixes by November 25, 2025, to secure their networks. Additionally, a new critical vulnerability, CVE-2025-12480 (CVSS score: 9.8), has been discovered in Gladinet's Triofox file-sharing and remote access platform. This flaw allows attackers to bypass authentication and access configuration pages, resulting in the upload and execution of arbitrary payloads. The threat cluster tracked as UNC6485 has been exploiting this flaw since August 24, 2025. The attackers have used the built-in antivirus feature to execute malicious files and set up encrypted tunnels to command-and-control servers, leveraging remote access tools like Zoho Assist and AnyDesk for further exploitation. The vulnerability CVE-2025-12480 was discovered and reported by Mandiant on November 10. The flaw allows an attacker to gain access to initial setup pages even after setup is complete, enabling the upload and execution of arbitrary payloads. The exploitation campaign started on August 14, 2025. The attackers exploited an HTTP Host header vulnerability by spoofing localhost in requests, bypassing access controls to reach the normally restricted AdminDatabase.aspx setup page. The flaw stemmed from missing origin validation and over-reliance on the host header, allowing unauthenticated remote access to critical configuration pages. The attackers logged in using the newly created Admin account and uploaded malicious files to execute them using the built-in anti-virus feature.
Sudo Vulnerability CVE-2025-32463 Actively Exploited in Linux and Unix Systems
A critical security flaw in the Sudo command-line utility for Linux and Unix-like operating systems, identified as CVE-2025-32463, is being actively exploited. This vulnerability affects Sudo versions 1.9.14 through 1.9.17 and allows local attackers to run arbitrary commands as root, even if they are not listed in the sudoers file. The flaw was disclosed in July 2025 and added to CISA's Known Exploited Vulnerabilities (KEV) catalog on September 30, 2025. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has advised Federal Civilian Executive Branch (FCEB) agencies to apply necessary mitigations by October 20, 2025, to secure their networks. The vulnerability was disclosed by Stratascale researcher Rich Mirch in July 2025. The flaw affects sudo versions 1.9.14 through 1.9.17 and has received a critical severity score of 9.3 out of 10. A proof-of-concept exploit for the CVE-2025-32463 flaw was released on July 4, 2025, and additional exploits have circulated publicly since July 1, 2025.
Critical deserialization flaw in GoAnywhere MFT (CVE-2025-10035) patched
The critical deserialization vulnerability (CVE-2025-10035) in GoAnywhere MFT has been actively exploited by the cybercrime group Storm-1175 in Medusa ransomware attacks since at least September 11, 2025. This flaw, rated 10.0 on the CVSS scale, allows for arbitrary command execution if the system is publicly accessible over the internet. Fortra has released patches in versions 7.8.4 and 7.6.3. The vulnerability was disclosed on September 18, 2025, but exploitation began a week earlier. The Shadowserver Foundation is monitoring over 513 GoAnywhere MFT instances exposed online, although the number of patched instances is unknown. The flaw impacts the same license code path as the earlier CVE-2023-0669, which was widely exploited by multiple ransomware and APT groups in 2023, including LockBit. The vulnerability enables an attacker to bypass signature verification by crafting a forged license response signature, allowing the deserialization of arbitrary, attacker-controlled objects. Successful exploitation could result in command injection and potential remote code execution (RCE) on the affected system. The threat actor used legitimate remote monitoring and management (RMM) tools SimpleHelp and MeshAgent to launch binaries following exploitation. The threat actor utilized RMM tools to establish command-and-control (C2) infrastructure and set up a Cloudflare tunnel for secure C2 communication. The deployment and execution of Rclone was observed in at least one victim environment during the exfiltration stage. Medusa ransomware has over 300 global victims in critical infrastructure sectors, including a confirmed attack on a US healthcare organization in early 2025. Fortra began investigating the vulnerability on September 11, 2025, following a customer report. Fortra contacted on-premises customers with publicly accessible admin consoles and notified law enforcement on September 11, 2025. A hotfix for versions 7.6.x, 7.7.x, and 7.8.x was released on September 12, 2025. Full patches for versions 7.6.3 and 7.8.4 were released on September 15, 2025. The CVE for the vulnerability was formally published on September 18, 2025. Fortra confirmed a limited number of reports of unauthorized activity related to CVE-2025-10035. Fortra recommends restricting admin console access over the internet and enabling monitoring. watchTowr CEO and founder Benjamin Harris reiterated the need for transparency from Fortra regarding the private keys used in the exploit.