CVE-2026-21725

Low
|2.0
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with admin access to a data source to delete it again after it has been recreated by someone else, even if they no longer have admin rights to the new version. However, this can only happen within 30 seconds of the original deletion, and the new data source must have the same unique identifier as the deleted one, which is randomly assigned by default.

Technical Description

A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data sources be re-deleted without permission to do so. This requires several very stringent conditions to be met: - The attacker must have admin access to the specific datasource prior to its first deletion. - Upon deletion, all steps within the attack must happen within the next 30 seconds and on the same pod of Grafana. - The attacker must delete the datasource, then someone must recreate it. - The new datasource must not have the attacker as an admin. - The new datasource must have the same UID as the prior datasource. These are randomised by default. - The datasource can now be re-deleted by the attacker. - Once 30 seconds are up, the attack is spent and cannot be repeated. - No datasource with any other UID can be attacked.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionRequired
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$300($100-$500)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Feb 25, 2026

about 1 month ago

Last Modified

Feb 27, 2026

about 1 month ago

Vendor

grafana

Product

grafana