CVE-2026-21725
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with admin access to a data source to delete it again after it has been recreated by someone else, even if they no longer have admin rights to the new version. However, this can only happen within 30 seconds of the original deletion, and the new data source must have the same unique identifier as the deleted one, which is randomly assigned by default.
Technical Description
A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data sources be re-deleted without permission to do so. This requires several very stringent conditions to be met: - The attacker must have admin access to the specific datasource prior to its first deletion. - Upon deletion, all steps within the attack must happen within the next 30 seconds and on the same pod of Grafana. - The attacker must delete the datasource, then someone must recreate it. - The new datasource must not have the attacker as an admin. - The new datasource must have the same UID as the prior datasource. These are randomised by default. - The datasource can now be re-deleted by the attacker. - Once 30 seconds are up, the attack is spent and cannot be repeated. - No datasource with any other UID can be attacked.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 25, 2026
about 1 month ago
Last Modified
Feb 27, 2026
about 1 month ago
Vendor
grafana
Product
grafana