CVE-2026-27880
Published: 27 March 2026
Summary
CVE-2026-27880 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Grafana Grafana. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates feature toggle evaluation endpoint inputs to enforce bounds on value sizes, preventing unbounded memory reads that cause out-of-memory crashes.
Protects against denial-of-service events like memory exhaustion by limiting effects of unbounded input processing in the OpenFeature endpoint.
Enforces resource limits on memory allocation during endpoint evaluation to mitigate out-of-memory conditions from large inputs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation of public-facing Grafana endpoint causes application crash via memory exhaustion, directly enabling T1190 (Exploit Public-Facing Application) for initial access/impact and T1499.004 (Application or System Exploitation) under Endpoint Denial of Service.
NVD Description
The OpenFeature feature toggle evaluation endpoint reads unbounded values into memory, which can cause out-of-memory crashes.
Deeper analysisAI
CVE-2026-27880 is a vulnerability in the OpenFeature feature toggle evaluation endpoint within Grafana that allows attackers to read unbounded values into memory, resulting in out-of-memory crashes. Published on 2026-03-27, it has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-787 (Out-of-bounds Write).
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation leads to high-impact denial of service by triggering out-of-memory conditions that crash the affected Grafana instance.
The Grafana security advisory provides details on this issue, available at https://grafana.com/security/security-advisories/cve-2026-27880.
Details
- CWE(s)