Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Grafana: Unauthenticated remote code execution
RHSA-2026:3188
Summary
Grafana, a popular data visualization tool, has a security issue that could allow an attacker to run unauthorized code on a server. This means that if an attacker knows how to exploit the issue, they could potentially gain control of the server. To stay safe, update Grafana to the latest version.
What to do
- Update redhat grafana to version 0:9.2.10-28.el8_10.
- Update redhat grafana-debuginfo to version 0:9.2.10-28.el8_10.
- Update redhat grafana-debugsource to version 0:9.2.10-28.el8_10.
- Update redhat grafana-selinux to version 0:9.2.10-28.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | grafana | <= 0:9.2.10-28.el8_10 | 0:9.2.10-28.el8_10 |
| redhat | grafana-debuginfo | <= 0:9.2.10-28.el8_10 | 0:9.2.10-28.el8_10 |
| redhat | grafana-debugsource | <= 0:9.2.10-28.el8_10 | 0:9.2.10-28.el8_10 |
| redhat | grafana-selinux | <= 0:9.2.10-28.el8_10 | 0:9.2.10-28.el8_10 |
Original title
Red Hat Security Advisory: grafana security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3188 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434431 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2437111 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3188.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61728 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61728 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61728 Vendor Advisory
- https://go.dev/cl/736713 Third Party Advisory
- https://go.dev/issue/77102 Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4342 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-68121 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68121 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68121 Vendor Advisory
- https://go.dev/cl/737700 Third Party Advisory
- https://go.dev/issue/77217 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/K09ubi9FQFk Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4337 Vendor Advisory
Published: 25 Feb 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026