Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

grafana

About This Vendor

grafana is a technology vendor producing software and infrastructure products. As a software provider, grafana's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of grafana's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 90 known vulnerabilities from grafana. This includes 10 critical-severity issues and 26 high-severity issues that represent significant risk. These vulnerabilities affect 29 distinct products across grafana's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2018 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying grafana products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-12099 2018-06-11 2024-11-21 6.1 4.3 Likely
CVE-2018-15727 2018-08-29 2024-11-21 9.8 7.5 Likely
CVE-2018-19039 2018-12-13 2024-11-21 6.5 4.0 Likely
CVE-2018-1000816 2018-12-20 2024-11-21 5.4 3.5 Unknown
CVE-2015-9282 2019-02-06 2024-11-21 6.1 4.3 Likely
CVE-2019-13068 2019-06-30 2024-11-21 5.4 4.3 Likely
CVE-2019-15043 2019-09-03 2024-11-21 7.5 5.0 Likely
CVE-2019-15635 2019-09-23 2024-11-21 4.9 4.0 Likely
CVE-2020-12245 2020-04-24 2024-11-21 6.1 4.3 Likely
CVE-2020-12052 2020-04-27 2024-11-21 6.1 4.3 Likely
CVE-2020-12458 2020-04-29 2024-11-21 5.5 2.1 Unknown
CVE-2020-12459 2020-04-29 2024-11-21 5.5 2.1 Unknown
CVE-2020-13429 2020-05-24 2024-11-21 5.4 3.5 Unknown
CVE-2020-13430 2020-05-24 2024-11-21 6.1 4.3 Likely
CVE-2018-18623 2020-06-02 2024-11-21 6.1 4.3 Likely
CVE-2018-18624 2020-06-02 2024-11-21 6.1 4.3 Likely
CVE-2018-18625 2020-06-02 2024-11-21 6.1 4.3 Likely
CVE-2020-13379 2020-06-03 2024-11-21 8.2 6.4 Likely
CVE-2020-11110 2020-07-27 2024-11-21 5.4 3.5 Unknown
CVE-2019-19499 2020-08-28 2024-11-21 6.5 4.0 Likely
CVE-2020-24303 2020-10-28 2024-11-21 6.1 4.3 Likely
CVE-2020-27846 2020-12-21 2024-11-21 9.8 10.0 Likely
CVE-2021-27358 2021-03-18 2024-11-21 7.5 5.0 Likely
CVE-2021-27962 2021-03-22 2024-11-21 7.1 4.9 Unknown
CVE-2021-28146 2021-03-22 2024-11-21 6.5 4.0 Likely
CVE-2021-28147 2021-03-22 2024-11-21 6.5 3.5 Unknown
CVE-2021-28148 2021-03-22 2024-11-21 7.5 5.0 Likely
CVE-2021-31231 2021-04-30 2024-11-21 5.5 2.1 Unknown
CVE-2021-36156 2021-08-03 2024-11-21 5.3 5.0 Likely
CVE-2021-39226 2021-10-05 2025-10-24 9.8 6.8 Likely
CVE-2021-41174 2021-11-03 2024-11-21 6.9 4.3 Likely
CVE-2021-41244 2021-11-15 2024-11-21 9.1 6.5 Likely
CVE-2021-43798 2021-12-07 2025-10-24 7.5 5.0 Likely
CVE-2021-41090 2021-12-08 2024-11-21 6.5 4.3 Likely
CVE-2021-43813 2021-12-10 2024-11-21 4.3 4.0 Likely
CVE-2021-43815 2021-12-10 2024-11-21 4.3 3.5 Unknown
CVE-2022-21673 2022-01-18 2024-11-21 4.3 3.5 Unknown
CVE-2022-21702 2022-02-08 2024-11-21 6.5 2.1 Unknown
CVE-2022-21703 2022-02-08 2024-11-21 6.3 6.8 Likely
CVE-2022-21713 2022-02-08 2024-11-21 4.3 3.5 Unknown
CVE-2022-26148 2022-03-21 2024-11-21 9.8 7.5 Likely
CVE-2022-24812 2022-04-12 2024-11-21 8.0 6.0 Unknown
CVE-2022-28660 2022-05-20 2024-11-21 9.8 7.5 Likely
CVE-2022-29170 2022-05-20 2024-11-21 6.6 4.9 Unknown
CVE-2022-32275 2022-06-06 2024-11-21 7.5 5.0 Likely
CVE-2022-32276 2022-06-17 2024-11-21 7.5 5.0 Likely
CVE-2022-31097 2022-07-15 2024-11-21 7.3 - -
CVE-2022-31107 2022-07-15 2024-11-21 7.1 - -
CVE-2022-31176 2022-09-02 2024-11-21 8.3 - -
CVE-2022-35957 2022-09-20 2024-11-21 6.6 - -
CVE-2022-36062 2022-09-22 2024-11-21 7.6 - -
CVE-2022-31123 2022-10-13 2024-11-21 6.1 - -
CVE-2022-31130 2022-10-13 2024-11-21 4.9 - -
CVE-2022-39201 2022-10-13 2024-11-21 6.8 - -
CVE-2022-39229 2022-10-13 2024-11-21 4.3 - -
CVE-2022-39328 2022-11-08 2024-11-21 9.8 - -
CVE-2022-39306 2022-11-09 2024-11-21 6.4 - -
CVE-2022-39307 2022-11-09 2024-11-21 6.7 - -
CVE-2022-46156 2022-11-30 2024-11-21 7.2 - -
CVE-2022-44643 2022-12-20 2025-04-15 5.7 - -
CVE-2022-23552 2023-01-27 2024-11-21 7.3 - -
CVE-2022-39324 2023-01-27 2024-11-21 6.7 - -
CVE-2022-23498 2023-02-03 2024-11-21 7.1 - -
CVE-2023-0507 2023-03-01 2025-02-13 7.3 - -
CVE-2023-0594 2023-03-01 2024-11-21 7.3 - -
CVE-2023-22462 2023-03-02 2024-11-21 6.4 - -
CVE-2023-1410 2023-03-23 2025-02-13 6.2 - -
CVE-2023-1387 2023-04-26 2025-02-13 4.2 - -
CVE-2023-2183 2023-06-06 2025-02-13 4.1 - -
CVE-2023-2801 2023-06-06 2025-02-13 7.5 - -
CVE-2023-3128 2023-06-22 2025-02-13 9.4 - -
CVE-2023-4822 2023-10-16 2025-06-16 6.7 - -
CVE-2023-4457 2023-10-16 2024-11-21 5.5 - -
CVE-2023-4399 2023-10-17 2025-02-13 6.6 - -
CVE-2023-3010 2023-10-25 2025-02-13 7.3 - -
CVE-2023-6152 2024-02-13 2025-02-15 5.4 - -
CVE-2023-5122 2024-02-14 2025-02-13 5.0 - -
CVE-2023-5123 2024-02-14 2026-01-06 8.0 - -
CVE-2024-1442 2024-03-07 2025-03-11 6.0 - -
CVE-2024-5526 2024-06-05 2024-11-21 7.7 - -
CVE-2024-8975 2024-09-25 2024-12-26 7.3 - -
CVE-2024-8996 2024-09-25 2024-10-01 7.3 - -
CVE-2024-9264 2024-10-18 2025-03-14 9.9 - -
CVE-2024-10452 2024-10-29 2024-11-08 2.2 - -
CVE-2025-4123 2025-05-22 2025-08-15 7.6 - -
CVE-2025-41115 2025-11-21 2026-01-08 10.0 - -
CVE-2026-21720 2026-01-27 2026-02-17 7.5 - -
CVE-2025-41117 2026-02-12 2026-02-26 6.8 - -
CVE-2026-21722 2026-02-12 2026-02-27 5.3 - -
CVE-2026-21725 2026-02-25 2026-02-27 2.6 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for grafana by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with grafana's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.