Vulnerability Report: GO-2025-3742
- CVE-2025-3454, GHSA-9j65-rv5x-4vrf
- Affects: github.com/grafana/grafana
- Published: Jun 09, 2025
- Unreviewed
Grafana's datasource proxy API allows authorization checks to be bypassed in github.com/grafana/grafana. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/grafana/grafana before v0.0.0-20250424191517-1f707d16ed5d.
For detailed information about this vulnerability, visit https://github.com/advisories/GHSA-9j65-rv5x-4vrf or https://nvd.nist.gov/vuln/detail/CVE-2025-3454.
Affected Modules
-
PathGo VersionsCustom Versions*
-
all versions, no known fixedbefore 0.0.0-20250424191517-1f707d16ed5d
*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck
. (See this note on versions for more details.)
Aliases
References
- https://github.com/advisories/GHSA-9j65-rv5x-4vrf
- https://nvd.nist.gov/vuln/detail/CVE-2025-3454
- https://github.com/grafana/grafana/blob/be8d153dc33734caba4f617ff571d18253e68fa0/CHANGELOG.md#10417security-01-2025-04-22
- https://grafana.com/blog/2025/04/22/grafana-security-release-medium-and-high-severity-fixes-for-cve-2025-3260-cve-2025-2703-cve-2025-3454
- https://grafana.com/security/security-advisories/cve-2025-3454
- https://vuln.go.dev/ID/GO-2025-3742.json