CVE-2026-27877
Published: 27 March 2026
Summary
CVE-2026-27877 is a medium-severity Cleartext Storage of Sensitive Information (CWE-312) vulnerability in Grafana Grafana. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and CM-6 (Configuration Settings).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-22 directly mitigates the exposure of sensitive data-source passwords in publicly accessible Grafana dashboards by requiring review, approval, and restriction of such content.
CM-6 enforces secure configuration settings, such as converting all direct data-sources to proxied ones, to comprehensively prevent password exposure as recommended in the Grafana advisory.
IA-5 protects data-source passwords from unauthorized disclosure by prohibiting clear-text storage and exposure in system interfaces like public dashboards.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing Grafana web app directly enables exploitation via T1190 to leak data-source passwords (unsecured credentials) through the public dashboard feature, mapping to T1552.
NVD Description
When using public dashboards and direct data-sources, all direct data-sources' passwords are exposed despite not being used in dashboards. No passwords of proxied data-sources are exposed. We encourage all direct data-sources to be converted to proxied data-sources as far as…
more
possible to improve your deployments' security.
Deeper analysisAI
CVE-2026-27877 is a vulnerability in Grafana that exposes passwords for all direct data-sources when public dashboards are used, even if those data-sources are not utilized by the dashboards in question. Passwords for proxied data-sources remain unexposed. The issue carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), highlighting a medium-severity confidentiality risk.
An attacker with low privileges, such as a Grafana user with Viewer access, can exploit this over the network with low complexity and no user interaction required. By accessing public dashboards, they gain visibility into credentials of unused direct data-sources, potentially enabling unauthorized access to backend databases or services configured with those credentials.
Grafana's security advisory for CVE-2026-27877, published on 2026-03-27, recommends converting all direct data-sources to proxied data-sources wherever possible to mitigate the exposure and enhance deployment security. Relevant details are available at https://grafana.com/security/security-advisories/cve-2026-27877.
Details
- CWE(s)