Back to search

Grafana

Grafana

See the latest tracked release, confirm when it was published, and subscribe for update emails.

Current version
Last checked: yesterday

12.0.10

Release date
February 12, 2026
CVE status
4 visible CVEs

Source

GitHub API

Public release notes are linked for the latest stored release.

Release history

See the latest published releases stored for this product.

Version Published Notes
12.0.10 2026-02-12 Release Notes

Vulnerability tracking

Review curated CVEs for this product and see whether the current version is marked affected. Only CVEs with a CVSS score of 7.0 or higher and published in the last 90 days are shown.

CVE Severity Published Status Summary
CVE-2026-27880 HIGH (7.5) 2026-03-27 Current versionaffected

The OpenFeature feature toggle evaluation endpoint reads unbounded values into memory, which can cause out-of-memory crashes.

Affected versions
  • Up to (excluding) 12.1.0
  • From (including) 12.1.10 - Up to (excluding) 12.2.0
Show 2 more
  • From (including) 12.2.8 - Up to (excluding) 12.3.0
  • From (including) 12.3.6 - Up to (excluding) 12.4.0
CVE-2026-27877 HIGH (7.5) 2026-03-27 Current versionnot affected

When using public dashboards and direct data-sources, all direct data-sources' passwords are exposed despite not being used in dashboards. No passwords of proxied data-sources are exposed. We encourage all direct data-sources to be converted to proxied data-sources as far as possible to improve your deployments' security.

Affected versions
  • Up to (excluding) 9.3.0
  • From (including) 11.6.14 - Up to (excluding) 12.0.0
Show 3 more
  • From (including) 12.1.10 - Up to (excluding) 12.2.0
  • From (including) 12.2.8 - Up to (excluding) 12.3.0
  • From (including) 12.3.6 - Up to (excluding) 12.4.0
CVE-2026-27876 CRITICAL (9.1) 2026-03-27 Current versionnot affected

A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead to a remote arbitrary code execution impact (RCE). This is enabled by a feature in Grafana (OSS), so all users are always recommended to update to avoid future attack vectors going this path. Only instances with the sqlExpressions feature toggle enabled are vulnerable. Only instances in the following version ranges are affected: - 11.6.0 (inclusive) to 11.6.14 (exclusive): 11.6.14 has the fix. 11.5 and below are not affected. - 12.0.0 (inclusive) to 12.1.10 (exclusive): 12.1.10 has the fix. 12.0 did not receive an update, as it is end-of-life. - 12.2.0 (inclusive) to 12.2.8 (exclusive): 12.2.8 has the fix. - 12.3.0 (inclusive) to 12.3.6 (exclusive): 12.3.6 has the fix. - 12.4.0 (inclusive) to 12.4.2 (exclusive): 12.4.2 has the fix. 13.0.0 and above also have the fix: no v13 release is affected.

Affected versions
  • Up to (excluding) 11.6.0
  • From (including) 11.6.14 - Up to (excluding) 12.0.0
Show 3 more
  • From (including) 12.1.10 - Up to (excluding) 12.2.0
  • From (including) 12.2.8 - Up to (excluding) 12.3.0
  • From (including) 12.3.6 - Up to (excluding) 12.4.0
CVE-2026-21720 HIGH (7.5) 2026-01-27 Current versionnot affected

Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine blocks forever trying to send on an unbuffered channel. Sustained traffic with random hashes keeps tripping this timeout, so goroutine count grows linearly, eventually exhausting memory and causing Grafana to crash on some systems.

Affected versions
  • From (including) 3.0.0 - Up to (excluding) 11.6.9
  • From (including) 12.0.0 - Up to (excluding) 12.0.8
Show 2 more
  • From (including) 12.1.0 - Up to (excluding) 12.1.5
  • From (including) 12.2.0 - Up to (excluding) 12.2.3