Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-28376— Grafana Live push endpoint allows unbounded memory allocation leading to OOM

CVSS 6.5 · Medium EPSS 0.04% · P13

Possible ATT&CK Techniques 1AI

T1496 · Resource Hijacking

Affected Version Matrix 10

VendorProductVersion RangeStatus
GrafanaGrafana OSS8.0.0≤ 11.6.14affected
11.6.14< 11.6.14+security-04affected
12.0.0≤ 12.2.8affected
12.2.8< 12.2.8+security-04affected
12.3.0≤ 12.3.6affected
12.3.6< 12.3.6+security-04affected
12.4.0≤ 12.4.3affected
12.4.3< 12.4.3+security-02affected
… +2 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-28376

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Grafana Live push endpoint allows unbounded memory allocation leading to OOM
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Grafana Live push endpoint can be exploited to cause unbounded memory allocation by sending a large or streaming request body, potentially leading to out-of-memory conditions. An authenticated user with access to the Grafana Live API can trigger this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grafana OSS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grafana OSS是Grafana开源的一个可视化仪表盘。 Grafana OSS存在安全漏洞,该漏洞源于Live推送端点可通过发送大型或流式请求体导致无限制内存分配,可能导致内存不足。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
GrafanaGrafana OSS 8.0.0 ~ 11.6.14 -

II. Public POCs for CVE-2026-28376

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-28376

登录查看更多情报信息。

Same Patch Batch · Grafana · 2026-05-13 · 10 CVEs total

CVE-2026-333767.4 HIGHAuth Proxy IPv6 whitelist bypass
CVE-2026-333777.1 HIGHDashboard Import Overwrites ACL — Editor Privilege Escalation to Dashboard Admin
CVE-2026-283796.5 MEDIUMViewer-triggered race condition in Grafana Live leads to complete server crash
CVE-2026-283806.5 MEDIUMBAC in Snapshot API allows deletion of unauthorized dashboard snapshots
CVE-2026-283836.5 MEDIUMGrafana plugin resources can lead to unbounded memory allocation
CVE-2026-333786.5 MEDIUMGrafana Data Source Plugin: DoS (OOM) via Negative Interval Injection in $__timeGroup Macr
CVE-2026-333806.3 MEDIUMSQL Expressions Read File From Disk
CVE-2026-333815.9 MEDIUMUsers can generate Service Account tokens after permissions removal
CVE-2026-283744.3 MEDIUMIDOR in Annotations API allows unprivileged users to DELETE annotation

IV. Related Vulnerabilities

V. Comments for CVE-2026-28376

No comments yet


Leave a comment