Description
Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1.
Grafana Cloud instances have already been patched and an audit did not find any usage of this attack vector. Grafana Enterprise customers were provided with updated binaries under embargo.
Recommendation
Update the @grafana/data package to the latest compatible version. Followings are version details:
- Affected version(s): >= 8.0.0, < 8.2.3
- Patched version(s): 8.2.3
References
Related Issues
- Arbitrary JavaScript Execution in typed-function - CVE-2017-1001004
- PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF - CVE-2024-4367
- jsPDF has PDF Injection in AcroFormChoiceField that allows Arbitrary JavaScript Execution - CVE-2026-24737
- Trix Editor Arbitrary Code Execution Vulnerability - CVE-2024-34341
- Tags:
- npm
- @grafana/data
Anything's wrong? Let us know Last updated on February 01, 2023