Company Details
grafana-labs
1,742
254,049
5112
grafana.com
0
GRA_1527465
In-progress

Grafana Labs Company CyberSecurity Posture
grafana.comGrafana Labs provides an open and composable observability stack built around Grafana, the leading open source technology for dashboards and visualization. There are 5,000+ Grafana Labs customers, including Bloomberg, Citigroup, Dell Technologies, Salesforce, and TomTom, and 25M+ Grafana users around the world. Grafana Labs helps companies achieve their observability goals with the LGTM Stack, which features scalable metrics (Grafana Mimir), logs (Grafana Loki), and traces (Grafana Tempo) as well as extensive enterprise data source plugins, dashboard management, alerting, reporting, and security. The fully managed Grafana Cloud offering helps organizations get observability up and running easier and faster, with turnkey solutions for Kubernetes and infrastructure monitoring, incident response management, load testing, application observability, and more. Grafana Labs is backed by leading investors Lightspeed Venture Partners, Lead Edge Capital, GIC, Sequoia Capital, Coatue, J.P. Morgan, and CapitalG. Follow Grafana Labs on LinkedIn and Twitter or visit grafana.com.
Company Details
grafana-labs
1,742
254,049
5112
grafana.com
0
GRA_1527465
In-progress
Between 750 and 799

Grafana Labs Global Score (TPRM)XXXX

Description: Grafana Labs disclosed a critical vulnerability (CVE-2025-41115) in its **Grafana Enterprise** product, enabling privilege escalation or impersonation of administrators when **SCIM provisioning** is misconfigured. The flaw arises from improper mapping of the `externalId` SCIM attribute to Grafana’s internal `user.uid`, allowing attackers to assign numeric IDs (e.g., `"1"`) to provisioned users, effectively granting them admin-level access. While exploitation requires both `enableSCIM` and `user_sync_enabled` to be active—a feature in *Public Preview*—the risk is severe due to Grafana’s widespread use across enterprises for data visualization and monitoring.The vulnerability affects versions **12.0.0 to 12.2.1** (excluding OSS and patched Cloud services). Grafana Labs confirmed no active exploitation in its Cloud environment but urged self-managed users to upgrade to versions **12.3.0, 12.2.1, 12.1.3, or 12.0.6** or disable SCIM. The flaw was internally discovered on **November 4**, patched within 24 hours, and publicly disclosed on **November 19**. Prior scanning activity for older Grafana flaws (e.g., path traversal) suggests potential reconnaissance for targeting this new vulnerability.Failure to patch could allow attackers to **compromise administrative accounts**, leading to unauthorized dashboard access, data manipulation, or lateral movement within enterprise networks. Given Grafana’s role in operational analytics, exploitation could disrupt monitoring, alerting, or compliance reporting, with cascading effects on security posture and incident response.
Description: More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover. The flaw, tracked as CVE-2025-4123, impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics. Despite security updates released on May 21, a significant number of instances remain vulnerable, posing a risk to user sessions and account credentials.


Grafana Labs has 365.12% more incidents than the average of same-industry companies with at least one recorded incident.
Grafana Labs has 207.69% more incidents than the average of all companies with at least one recorded incident.
Grafana Labs reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 2 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Grafana Labs cyber incidents detection timeline including parent company and subsidiaries

Grafana Labs provides an open and composable observability stack built around Grafana, the leading open source technology for dashboards and visualization. There are 5,000+ Grafana Labs customers, including Bloomberg, Citigroup, Dell Technologies, Salesforce, and TomTom, and 25M+ Grafana users around the world. Grafana Labs helps companies achieve their observability goals with the LGTM Stack, which features scalable metrics (Grafana Mimir), logs (Grafana Loki), and traces (Grafana Tempo) as well as extensive enterprise data source plugins, dashboard management, alerting, reporting, and security. The fully managed Grafana Cloud offering helps organizations get observability up and running easier and faster, with turnkey solutions for Kubernetes and infrastructure monitoring, incident response management, load testing, application observability, and more. Grafana Labs is backed by leading investors Lightspeed Venture Partners, Lead Edge Capital, GIC, Sequoia Capital, Coatue, J.P. Morgan, and CapitalG. Follow Grafana Labs on LinkedIn and Twitter or visit grafana.com.


Adhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we

Zoho offers beautifully smart software to help you grow your business. With over 100 million users worldwide, Zoho's 55+ products aid your sales and marketing, support and collaboration, finance, and recruitment needs—letting you focus only on your business. Zoho respects user privacy and does not h

A career at Booking.com is all about the journey, helping you explore new challenges in a place where you can be your best self. With plenty of exciting twists, turns and opportunities along the way. We’ve always been pioneers, on a mission to shape the future of travel through cutting edge techno
Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. We are driven by the excitement of building technologies, inventing products, and providing services that change lives. We embrac
Upwork is the world’s work marketplace that connects businesses with independent talent from across the globe. We serve everyone from one-person startups to large, Fortune 100 enterprises with a powerful, trust-driven platform that enables companies and talent to work together in new ways that unloc
Databricks is the Data and AI company. More than 10,000 organizations worldwide — including Block, Comcast, Condé Nast, Rivian, Shell and over 60% of the Fortune 500 — rely on the Databricks Data Intelligence Platform to take control of their data and put it to work with AI. Databricks is headquarte
A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we c

**Snowflake is proud to be the Official Data Collaboration Provider for LA28 and Team USA.** Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite

The first business of Alibaba Group, Alibaba.com (www.alibaba.com) is the leading platform for global wholesale trade serving millions of buyers and suppliers around the world. Through Alibaba.com, small businesses can sell their products to companies in other countries. Sellers on Alibaba.com are t
.png)
Grafana Labs has issued a warning regarding a maximum-severity security flaw, identified as CVE-2025-41115, affecting its Enterprise product...
Grafana Labs disclosed a security flaw affecting Grafana Enterprise that could allow attackers to escalate privileges and impersonate users.
Grafana Labs has released critical security patches addressing a severe vulnerability in Grafana Enterprise that could allow attackers to...
Meet the latest billion-dollar startups. Explore trends in unicorn formation over time, by industry and location.
With a client list that includes Nvidia, Anthropic and Uber, the $6 billion-valued Grafana Labs is flexing with $400 million in annualized...
The tenth annual Forbes Cloud 100 list ranks the top private cloud computing companies — this year dominated by AI.
Two significant Grafana vulnerabilities that could allow attackers to redirect users to malicious websites and execute arbitrary JavaScript...
Grafana Labs has issued urgent security patches addressing two significant vulnerabilities affecting multiple versions of the popular monitoring platform.
Grafana Labs has released critical security patches addressing two significant vulnerabilities that could enable attackers to redirect users to malicious...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Grafana Labs is https://grafana.com.
According to Rankiteo, Grafana Labs’s AI-generated cybersecurity score is 761, reflecting their Fair security posture.
According to Rankiteo, Grafana Labs currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Grafana Labs is not certified under SOC 2 Type 1.
According to Rankiteo, Grafana Labs does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Grafana Labs is not listed as GDPR compliant.
According to Rankiteo, Grafana Labs does not currently maintain PCI DSS compliance.
According to Rankiteo, Grafana Labs is not compliant with HIPAA regulations.
According to Rankiteo,Grafana Labs is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Grafana Labs operates primarily in the Software Development industry.
Grafana Labs employs approximately 1,742 people worldwide.
Grafana Labs presently has no subsidiaries across any sectors.
Grafana Labs’s official LinkedIn profile has approximately 254,049 followers.
Grafana Labs is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Grafana Labs has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/raintank.
Yes, Grafana Labs maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/grafana-labs.
As of December 07, 2025, Rankiteo reports that Grafana Labs has experienced 2 cybersecurity incidents.
Grafana Labs has an estimated 27,336 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01, and and containment measures with patch deployment (grafana enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6), containment measures with disabling scim provisioning, and remediation measures with software updates, remediation measures with configuration changes (disabling scim), and communication strategy with public security bulletin, communication strategy with customer advisories..
Title: Grafana Ghost Vulnerability (CVE-2025-4123)
Description: More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover.
Date Publicly Disclosed: 2023-05-21
Type: Vulnerability Exploitation
Attack Vector: Client-side open redirect
Vulnerability Exploited: CVE-2025-4123
Motivation: Account takeover, execution of malicious plugins
Title: Grafana Enterprise Privilege Escalation Vulnerability (CVE-2025-41115)
Description: Grafana Labs has disclosed a maximum severity vulnerability (CVE-2025-41115) in its Enterprise product that allows new users to be treated as administrators or enables privilege escalation when SCIM (System for Cross-domain Identity Management) provisioning is enabled. The flaw arises when both the 'enableSCIM' feature flag and 'user_sync_enabled' options are set to true, permitting a malicious or compromised SCIM client to provision a user with a numeric 'externalId' that maps to an internal account, including administrators. This could lead to impersonation or unauthorized privilege escalation. The issue was discovered during internal auditing on November 4, 2024, and patched within 24 hours. Public disclosure followed on November 19, 2024. Grafana Cloud services (including Amazon Managed Grafana and Azure Managed Grafana) were patched prior to disclosure, while self-managed installations require updates to versions 12.3.0, 12.2.1, 12.1.3, or 12.0.6. Grafana OSS users are unaffected.
Date Detected: 2024-11-04
Date Publicly Disclosed: 2024-11-19
Type: Vulnerability
Attack Vector: NetworkSCIM Provisioning Misconfiguration
Vulnerability Exploited: CVE-2025-41115 (Improper Mapping of SCIM 'externalId' to Internal 'user.uid')
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Systems Affected: 46,506 Grafana instances

Systems Affected: Grafana Enterprise (Self-Managed)
Operational Impact: Potential Unauthorized Administrative AccessImpersonation Risk
Brand Reputation Impact: Potential Erosion of Trust Due to Privilege Escalation Risk

Entity Name: Grafana Labs
Entity Type: Software Company
Industry: Technology

Entity Name: Grafana Labs
Entity Type: Organization
Industry: Software, Data Visualization, Monitoring
Location: Global

Remediation Measures: Upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01

Incident Response Plan Activated: True
Containment Measures: Patch Deployment (Grafana Enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6)Disabling SCIM Provisioning
Remediation Measures: Software UpdatesConfiguration Changes (Disabling SCIM)
Communication Strategy: Public Security BulletinCustomer Advisories
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01, Software Updates, Configuration Changes (Disabling SCIM), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by patch deployment (grafana enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6), disabling scim provisioning and .

Lessons Learned: Regularly update and patch software to mitigate vulnerabilities.

Lessons Learned: Importance of Secure Default Configurations for Preview Features, Rapid Patch Deployment for Critical Vulnerabilities, Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity)

Recommendations: Upgrade to the latest patched versions of Grafana.

Recommendations: Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.
Key Lessons Learned: The key lessons learned from past incidents are Regularly update and patch software to mitigate vulnerabilities.Importance of Secure Default Configurations for Preview Features,Rapid Patch Deployment for Critical Vulnerabilities,Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity).
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Upgrade to the latest patched versions of Grafana..

Source: BleepingComputer

Source: Grafana Labs Security Bulletin
Date Accessed: 2024-11-19

Source: GreyNoise Report on Grafana Scanning Activity
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: Grafana Labs Security BulletinDate Accessed: 2024-11-19, and Source: GreyNoise Report on Grafana Scanning Activity.

Investigation Status: Resolved (No Evidence of Exploitation in Grafana Cloud)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Security Bulletin and Customer Advisories.

Stakeholder Advisories: Customers Advised To Apply Patches Or Disable Scim.
Customer Advisories: Public security bulletin issued with mitigation steps
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Customers Advised To Apply Patches Or Disable Scim, Public Security Bulletin Issued With Mitigation Steps and .

Root Causes: Unpatched software, lack of awareness about the vulnerability
Corrective Actions: Apply security patches, increase user awareness about updates

Root Causes: Improper Mapping Of Scim 'Externalid' To Internal 'User.Uid' In Grafana Enterprise, Insufficient Validation Of Numeric 'Externalid' Values During User Provisioning, Preview Feature (Scim) Enabled Without Robust Safeguards,
Corrective Actions: Released Patched Versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) With Fixed Scim Provisioning Logic, Enhanced Input Validation For Scim Attributes, Proactive Communication To Customers About Risk And Mitigations,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Apply security patches, increase user awareness about updates, Released Patched Versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) With Fixed Scim Provisioning Logic, Enhanced Input Validation For Scim Attributes, Proactive Communication To Customers About Risk And Mitigations, .
Most Recent Incident Detected: The most recent incident detected was on 2024-11-04.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-11-19.
Most Significant System Affected: The most significant system affected in an incident was Grafana Enterprise (Self-Managed).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Patch Deployment (Grafana Enterprise 12.3.0, 12.2.1, 12.1.3 and 12.0.6)Disabling SCIM Provisioning.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor for unusual SCIM-related activity or privilege escalation attempts., Disable SCIM provisioning if not required., Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Upgrade to the latest patched versions of Grafana., Review and audit user provisioning workflows and especially for identity management integrations..
Most Recent Source: The most recent source of information about an incident are Grafana Labs Security Bulletin, GreyNoise Report on Grafana Scanning Activity and BleepingComputer.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved (No Evidence of Exploitation in Grafana Cloud).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers advised to apply patches or disable SCIM, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Public security bulletin issued with mitigation steps.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Unpatched software, lack of awareness about the vulnerability, Improper mapping of SCIM 'externalId' to internal 'user.uid' in Grafana EnterpriseInsufficient validation of numeric 'externalId' values during user provisioningPreview feature (SCIM) enabled without robust safeguards.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Apply security patches, increase user awareness about updates, Released patched versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) with fixed SCIM provisioning logicEnhanced input validation for SCIM attributesProactive communication to customers about risk and mitigations.
.png)
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM Otherwise accessing them can cause a crash.
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices Previously, APU platforms (and other scenarios with uninitialized VRAM managers) triggered a NULL pointer dereference in `ttm_resource_manager_usage()`. The root cause is not that the `struct ttm_resource_manager *man` pointer itself is NULL, but that `man->bdev` (the backing device pointer within the manager) remains uninitialized (NULL) on APUs—since APUs lack dedicated VRAM and do not fully set up VRAM manager structures. When `ttm_resource_manager_usage()` attempts to acquire `man->bdev->lru_lock`, it dereferences the NULL `man->bdev`, leading to a kernel OOPS. 1. **amdgpu_cs.c**: Extend the existing bandwidth control check in `amdgpu_cs_get_threshold_for_moves()` to include a check for `ttm_resource_manager_used()`. If the manager is not used (uninitialized `bdev`), return 0 for migration thresholds immediately—skipping VRAM-specific logic that would trigger the NULL dereference. 2. **amdgpu_kms.c**: Update the `AMDGPU_INFO_VRAM_USAGE` ioctl and memory info reporting to use a conditional: if the manager is used, return the real VRAM usage; otherwise, return 0. This avoids accessing `man->bdev` when it is NULL. 3. **amdgpu_virt.c**: Modify the vf2pf (virtual function to physical function) data write path. Use `ttm_resource_manager_used()` to check validity: if the manager is usable, calculate `fb_usage` from VRAM usage; otherwise, set `fb_usage` to 0 (APUs have no discrete framebuffer to report). This approach is more robust than APU-specific checks because it: - Works for all scenarios where the VRAM manager is uninitialized (not just APUs), - Aligns with TTM's design by using its native helper function, - Preserves correct behavior for discrete GPUs (which have fully initialized `man->bdev` and pass the `ttm_resource_manager_used()` check). v4: use ttm_resource_manager_used(&adev->mman.vram_mgr.manager) instead of checking the adev->gmc.is_app_apu flag (Christian)
In the Linux kernel, the following vulnerability has been resolved: exfat: fix improper check of dentry.stream.valid_size We found an infinite loop bug in the exFAT file system that can lead to a Denial-of-Service (DoS) condition. When a dentry in an exFAT filesystem is malformed, the following system calls — SYS_openat, SYS_ftruncate, and SYS_pwrite64 — can cause the kernel to hang. Root cause analysis shows that the size validation code in exfat_find() does not check whether dentry.stream.valid_size is negative. As a result, the system calls mentioned above can succeed and eventually trigger the DoS issue. This patch adds a check for negative dentry.stream.valid_size to prevent this vulnerability.
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix possible memory leak in smb2_read() Memory leak occurs when ksmbd_vfs_read() fails. Fix this by adding the missing kvfree().
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix possible refcount leak in smb2_sess_setup() Reference count of ksmbd_session will leak when session need reconnect. Fix this by adding the missing ksmbd_user_session_put().

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.