From 522f58e6c5afa86b43c15e0589286fb0ba85a7c9 Mon Sep 17 00:00:00 2001 From: liad eliyahu <135616390+liad-miggo@users.noreply.github.com> Date: Mon, 27 Apr 2026 16:08:49 +0300 Subject: [PATCH] Improve GHSA-736h-475m-xhjc --- .../GHSA-736h-475m-xhjc.json | 22 +++++++++++++++++-- 1 file changed, 20 insertions(+), 2 deletions(-) diff --git a/advisories/unreviewed/2026/03/GHSA-736h-475m-xhjc/GHSA-736h-475m-xhjc.json b/advisories/unreviewed/2026/03/GHSA-736h-475m-xhjc/GHSA-736h-475m-xhjc.json index c2b5479eefe0f..12bb672d47020 100644 --- a/advisories/unreviewed/2026/03/GHSA-736h-475m-xhjc/GHSA-736h-475m-xhjc.json +++ b/advisories/unreviewed/2026/03/GHSA-736h-475m-xhjc/GHSA-736h-475m-xhjc.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-736h-475m-xhjc", - "modified": "2026-03-27T15:30:25Z", + "modified": "2026-03-27T18:31:26Z", "published": "2026-03-27T15:30:25Z", "aliases": [ "CVE-2026-27876" ], + "summary": "Critical RCE on Grafana using viewer privileges ", "details": "A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead to a remote arbitrary code execution impact (RCE). This is enabled by a feature in Grafana (OSS), so all users are always recommended to update to avoid future attack vectors going this path.\n\nOnly instances with the sqlExpressions feature toggle enabled are vulnerable.", "severity": [ { @@ -13,7 +14,24 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",