Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33376— Auth Proxy IPv6 whitelist bypass

CVSS 7.4 · High EPSS 0.03% · P9

Possible ATT&CK Techniques 1AI

T1190 · Exploit Public-Facing Application

Affected Version Matrix 10

VendorProductVersion RangeStatus
GrafanaGrafana OSS9.4.0≤ 11.6.14affected
11.6.14< 11.6.14+security-04affected
12.0.0≤ 12.2.8affected
12.2.8< 12.2.8+security-04affected
12.3.0≤ 12.3.6affected
12.3.6< 12.3.6+security-04affected
12.4.0≤ 12.4.3affected
12.4.3< 12.4.3+security-02affected
… +2 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33376

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Auth Proxy IPv6 whitelist bypass
Source: NVD (National Vulnerability Database)
Vulnerability Description
When using an IPv6 allow-list for the Auth Proxy feature, it defaults to /32 addresses. Addresses specifying a mask explicitly are not affected; to mitigate easily, add the desired mask (usually /128) to the addresses. Only auth proxy is affected; Okta, SAML, LDAP, etc are unaffected here.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grafana OSS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grafana OSS是Grafana开源的一个可视化仪表盘。 Grafana OSS存在安全漏洞,该漏洞源于Auth Proxy功能使用IPv6允许列表时默认为/32地址,可能导致配置问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
GrafanaGrafana OSS 9.4.0 ~ 11.6.14 -

II. Public POCs for CVE-2026-33376

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33376

登录查看更多情报信息。

Same Patch Batch · Grafana · 2026-05-13 · 10 CVEs total

CVE-2026-333777.1 HIGHDashboard Import Overwrites ACL — Editor Privilege Escalation to Dashboard Admin
CVE-2026-283796.5 MEDIUMViewer-triggered race condition in Grafana Live leads to complete server crash
CVE-2026-283806.5 MEDIUMBAC in Snapshot API allows deletion of unauthorized dashboard snapshots
CVE-2026-283836.5 MEDIUMGrafana plugin resources can lead to unbounded memory allocation
CVE-2026-283766.5 MEDIUMGrafana Live push endpoint allows unbounded memory allocation leading to OOM
CVE-2026-333786.5 MEDIUMGrafana Data Source Plugin: DoS (OOM) via Negative Interval Injection in $__timeGroup Macr
CVE-2026-333806.3 MEDIUMSQL Expressions Read File From Disk
CVE-2026-333815.9 MEDIUMUsers can generate Service Account tokens after permissions removal
CVE-2026-283744.3 MEDIUMIDOR in Annotations API allows unprivileged users to DELETE annotation

IV. Related Vulnerabilities

V. Comments for CVE-2026-33376

No comments yet


Leave a comment