Cyber Posture

CVE-2026-27877

Medium

Published: 27 March 2026

Published
27 March 2026
Modified
10 May 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 4.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27877 is a medium-severity Cleartext Storage of Sensitive Information (CWE-312) vulnerability in Grafana Grafana. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-22 directly mitigates the exposure of sensitive data-source passwords in publicly accessible Grafana dashboards by requiring review, approval, and restriction of such content.

prevent

CM-6 enforces secure configuration settings, such as converting all direct data-sources to proxied ones, to comprehensively prevent password exposure as recommended in the Grafana advisory.

prevent

IA-5 protects data-source passwords from unauthorized disclosure by prohibiting clear-text storage and exposure in system interfaces like public dashboards.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Vulnerability in public-facing Grafana web app directly enables exploitation via T1190 to leak data-source passwords (unsecured credentials) through the public dashboard feature, mapping to T1552.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

When using public dashboards and direct data-sources, all direct data-sources' passwords are exposed despite not being used in dashboards. No passwords of proxied data-sources are exposed. We encourage all direct data-sources to be converted to proxied data-sources as far as…

more

possible to improve your deployments' security.

Deeper analysisAI

CVE-2026-27877 is a vulnerability in Grafana that exposes passwords for all direct data-sources when public dashboards are used, even if those data-sources are not utilized by the dashboards in question. Passwords for proxied data-sources remain unexposed. The issue carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), highlighting a medium-severity confidentiality risk.

An attacker with low privileges, such as a Grafana user with Viewer access, can exploit this over the network with low complexity and no user interaction required. By accessing public dashboards, they gain visibility into credentials of unused direct data-sources, potentially enabling unauthorized access to backend databases or services configured with those credentials.

Grafana's security advisory for CVE-2026-27877, published on 2026-03-27, recommends converting all direct data-sources to proxied data-sources wherever possible to mitigate the exposure and enhance deployment security. Relevant details are available at https://grafana.com/security/security-advisories/cve-2026-27877.

Details

CWE(s)

Affected Products

grafana
grafana
≤ 9.3.0 · 11.6.14 — 12.0.0 · 12.1.10 — 12.2.0

CVEs Like This One

CVE-2026-27876Same product: Grafana Grafana
CVE-2026-27880Same product: Grafana Grafana
CVE-2026-21720Same product: Grafana Grafana
CVE-2026-21721Same product: Grafana Grafana
CVE-2025-41118Same vendor: Grafana
CVE-2026-28377Same vendor: Grafana
CVE-2026-34833Shared CWE-312
CVE-2026-33867Shared CWE-312
CVE-2026-27520Shared CWE-312
CVE-2026-25751Shared CWE-312

References