Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Grafana PCP Plugin Flaw Allows Unauthorized Access to System Data
RHSA-2026:3815
Summary
A security update is available for the Grafana PCP plugin, which fixes a flaw that could allow an attacker to access sensitive system data. This affects Grafana users who have installed the PCP plugin. Users should update their plugin to the latest version to prevent potential unauthorized data access.
What to do
- Update redhat grafana-pcp to version 0:3.0.2-3.el8_4.
- Update redhat grafana-pcp-debuginfo to version 0:3.0.2-3.el8_4.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | grafana-pcp | <= 0:3.0.2-3.el8_4 | 0:3.0.2-3.el8_4 |
| redhat | grafana-pcp-debuginfo | <= 0:3.0.2-3.el8_4 | 0:3.0.2-3.el8_4 |
| redhat | grafana-pcp | <= 0:3.0.2-3.el8_4 | 0:3.0.2-3.el8_4 |
| redhat | grafana-pcp-debuginfo | <= 0:3.0.2-3.el8_4 | 0:3.0.2-3.el8_4 |
Original title
Red Hat Security Advisory: grafana-pcp security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3815 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2418462 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3815.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61729 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61729 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61729 Vendor Advisory
- https://go.dev/cl/725920 Third Party Advisory
- https://go.dev/issue/76445 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/8FJoBkPddm4 Third Party Advisory
- https://pkg.go.dev/vuln/GO-2025-4155 Vendor Advisory
Published: 5 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026