Critical Grafana flaws can lead to remote code execution and server crashes


Grafana users need to patch quickly. Grafana Labs has released security fixes for two newly disclosed vulnerabilities, including one critical bug that can lead to remote code execution and another high-severity issue that can crash a server through unauthenticated requests. The fixes landed in Grafana 12.4.2 and backported releases for older supported branches.

The more dangerous flaw is CVE-2026-27876, which Grafana rates Critical with a CVSS score of 9.1. Grafana says the bug sits in the SQL Expressions feature and can let an attacker write arbitrary files to the server, which then opens a path to full code execution when combined with other components in the environment.

The second issue, CVE-2026-27880, is a High severity denial-of-service bug with a CVSS score of 7.5. Grafana says unauthenticated OpenFeature evaluation endpoints accept unbounded input into memory, which means a remote attacker can send oversized requests and force the Grafana server into an out-of-memory crash.

How the critical Grafana RCE bug works

Grafana says CVE-2026-27876 affects instances where the sqlExpressions feature toggle is enabled. According to the company, the feature allows query data to be transformed with SQL syntax, but that same behavior also made arbitrary file writes possible in a way that could be chained into remote code execution.

The attack is not fully unauthenticated. Grafana says an attacker needs permission to execute data source queries, which means Viewer access or higher. If that condition is met, the attacker can overwrite a Sqlyze driver or write an AWS data source configuration file and then use that foothold to reach full code execution.

Grafana also confirmed the chain can be severe enough to produce an unauthorized SSH connection to the underlying host. That detail matters because it moves the impact beyond dashboard abuse and into direct server compromise.

The DoS flaw is easier to reach

CVE-2026-27880 does not require authentication. Grafana says the vulnerable OpenFeature evaluation endpoints read unbounded input into memory, which gives an attacker a simple way to exhaust available memory and crash the instance.

That makes the second bug less powerful than the RCE issue, but easier to trigger. A remote attacker does not need an account, special privileges, or user interaction. They only need to hit the exposed endpoint with sufficiently large requests.

Grafana says this vulnerability affects versions 12.1.0 and later. The critical SQL Expressions issue has a slightly different exposure window, with impacted versions starting at 11.6.0 and later.

Affected and fixed versions

IssueSeverityImpactAffected versionsFixed versions
CVE-2026-27876Critical 9.1Arbitrary file write that can chain into RCE11.6.0 and later, with sqlExpressions enabled12.4.2, 12.3.6, 12.2.8, 12.1.10, 11.6.14
CVE-2026-27880High 7.5Unauthenticated DoS via memory exhaustion12.1.0 and later12.4.2, 12.3.6, 12.2.8, 12.1.10, 11.6.14

Grafana says managed offerings received advance fixes under embargo. The company stated that Grafana Cloud was patched, and that Amazon Managed Grafana and Azure Managed Grafana had also confirmed their offerings were secure at the time of the public announcement.

That reduces the immediate risk for customers on managed services, but self-hosted teams still need to act. If you run Grafana on your own infrastructure, these bugs remain your patching problem until you upgrade or apply temporary mitigations.

What admins should do right now

The best fix is to upgrade to a patched version as soon as possible. Grafana’s published fixed versions are 12.4.2, 12.3.6, 12.2.8, 12.1.10, and 11.6.14.

If you cannot patch immediately, Grafana says you should disable the sqlExpressions feature toggle to reduce exposure to CVE-2026-27876. The company also says a stronger temporary mitigation requires both updating Sqlyze to at least v1.5.0 or disabling it, and disabling all AWS data sources. Grafana warns that these steps reduce risk but do not fully remediate the issue.

For CVE-2026-27880, Grafana recommends running in a highly available setup with automatic restarts and placing a reverse proxy in front of Grafana to limit request size. Grafana specifically notes that Cloudflare does this by default and that Nginx can enforce it through configuration.

Quick checklist

  • Upgrade Grafana to a fixed release immediately
  • Disable sqlExpressions if you cannot patch yet
  • Update Sqlyze to v1.5.0 or later, or disable it
  • Disable AWS data sources if you must rely on the temporary RCE mitigation
  • Put a reverse proxy in front of Grafana and limit request sizes
  • Review whether exposed Grafana instances allow Viewer query execution

FAQ

What is the most dangerous Grafana vulnerability here?

CVE-2026-27876 is the more serious flaw. Grafana rates it Critical and says it can lead to remote code execution through arbitrary file writes when sqlExpressions is enabled.

Does the RCE bug require authentication?

Yes. Grafana says the attacker needs Viewer permissions or higher so they can execute data source queries.

Is the DoS vulnerability unauthenticated?

Yes. Grafana says the OpenFeature evaluation endpoint accepts unbounded input without authentication, which can let a remote attacker crash the server.

Are managed Grafana services already protected?

Grafana says Grafana Cloud was patched under embargo, and that Amazon Managed Grafana and Azure Managed Grafana confirmed they were secure at the time of the announcement.

Which versions should I install?

Grafana says the patched releases are 12.4.2, 12.3.6, 12.2.8, 12.1.10, and 11.6.14.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages