Company Details
grafana-labs
1,772
258,334
5112
grafana.com
0
GRA_1527465
In-progress


Grafana Labs Company CyberSecurity Posture
grafana.comGrafana Labs, the company behind the open observability cloud, is founded on the principles of open source, open standards, open ecosystems, and open culture. Grafana Cloud, our fully managed observability platform, is flexible and built for scale, enabling organizations to see, understand, and act on all their disparate data so they can move at the speed of their ambitions. Today, more than 25 million users and 7,000+ customers – including Anthropic, Bloomberg, NVIDIA, Microsoft, and Salesforce – trust Grafana Labs to ensure reliability of their applications and systems, resolve incidents quickly, and optimize their telemetry to reduce noise and cost. We are a 100% remote company with 1,400+ team members across 40+ countries, and we’re backed by leading investors including Lightspeed Venture Partners, Sequoia Capital, GIC, Coatue, J.P. Morgan, CapitalG, and Lead Edge Capital. Follow Grafana Labs on LinkedIn and Twitter or visit grafana.com.
Company Details
grafana-labs
1,772
258,334
5112
grafana.com
0
GRA_1527465
In-progress
Between 750 and 799

Grafana Labs Global Score (TPRM)XXXX

Description: Grafana Labs disclosed a critical vulnerability (CVE-2025-41115) in its Grafana Enterprise product, enabling privilege escalation or impersonation of administrators when SCIM provisioning is misconfigured. The flaw arises from improper mapping of the `externalId` SCIM attribute to Grafana’s internal `user.uid`, allowing attackers to assign numeric IDs (e.g., `"1"`) to provisioned users, effectively granting them admin-level access. While exploitation requires both `enableSCIM` and `user_sync_enabled` to be active a feature in *Public Preview* the risk is severe due to Grafana’s widespread use across enterprises for data visualization and monitoring.The vulnerability affects versions 12.0.0 to 12.2.1 (excluding OSS and patched Cloud services). Grafana Labs confirmed no active exploitation in its Cloud environment but urged self-managed users to upgrade to versions 12.3.0, 12.2.1, 12.1.3, or 12.0.6 or disable SCIM. The flaw was internally discovered on November 4, patched within 24 hours, and publicly disclosed on November 19. Prior scanning activity for older Grafana flaws (e.g., path traversal) suggests potential reconnaissance for targeting this new vulnerability.Failure to patch could allow attackers to compromise administrative accounts, leading to unauthorized dashboard access, data manipulation, or lateral movement within enterprise networks. Given Grafana’s role in operational analytics, exploitation could disrupt monitoring, alerting, or compliance reporting, with cascading effects on security posture and incident response.
Description: More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover. The flaw, tracked as CVE-2025-4123, impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics. Despite security updates released on May 21, a significant number of instances remain vulnerable, posing a risk to user sessions and account credentials.


No incidents recorded for Grafana Labs in 2026.
No incidents recorded for Grafana Labs in 2026.
No incidents recorded for Grafana Labs in 2026.
Grafana Labs cyber incidents detection timeline including parent company and subsidiaries

Grafana Labs, the company behind the open observability cloud, is founded on the principles of open source, open standards, open ecosystems, and open culture. Grafana Cloud, our fully managed observability platform, is flexible and built for scale, enabling organizations to see, understand, and act on all their disparate data so they can move at the speed of their ambitions. Today, more than 25 million users and 7,000+ customers – including Anthropic, Bloomberg, NVIDIA, Microsoft, and Salesforce – trust Grafana Labs to ensure reliability of their applications and systems, resolve incidents quickly, and optimize their telemetry to reduce noise and cost. We are a 100% remote company with 1,400+ team members across 40+ countries, and we’re backed by leading investors including Lightspeed Venture Partners, Sequoia Capital, GIC, Coatue, J.P. Morgan, CapitalG, and Lead Edge Capital. Follow Grafana Labs on LinkedIn and Twitter or visit grafana.com.

Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right person at the right mo
SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and
Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s
Groupon is an experiences marketplace that brings people more ways to get the most out of their city or wherever they may be. By enabling real-time mobile commerce across local businesses, live events and travel destinations, Groupon helps people find and discover experiences––big and small, new and

We’re the delivery market leader in Latin America. Our platform connects over 77.000 restaurants, supermarkets, pharmacies and stores with millions of users. Nowadays we operate in more than 500 cities in Latinamerica. And we are now over 3.400 employees. PedidosYa is available for iOS, Android and

🌍Alibaba Group is on a mission to make it easy to do business anywhere! Guided by our passion and imagination, we’re leading the way in AI, cloud computing and e-commerce. We aim to build the future infrastructure of commerce, and we aspire to be a good company that lasts for 102 years.

Join us in our mission to help the world get well, help the world stay well, and help future generations be healthier. We hire smart and motivated people from all academic majors to code, test, and implement healthcare software that hundreds of millions of patients and doctors rely on to improve ca

Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, hybrid cloud, edge, and Kubernetes technologies. We hire creative, passionate people who are ready to contribute their ideas, help solve complex problems
.png)
Meet the latest billion-dollar startups. Explore trends in unicorn formation over time, by industry and location.
Recent Gartner research also emphasizes role of neoclouds in solving the cost, agility, and supply challenges to AI development.
At ObservabilityCON 2025, Grafana Labs, a leading observability provider, sketched out a bold vision for the observability landscape...
Wipro and Grafana Labs provide an advanced observability solution with AI-powered monitoring, predictive insights, and real-time cloud performance...
Welcome to watchTowr vs the Internet, part 68. That feeling you're experiencing? Dread. You should be used to it by now.
Grafana Labs disclosed a security flaw affecting Grafana Enterprise that could allow attackers to escalate privileges and impersonate users.
Grafana Labs has released critical security patches addressing a severe vulnerability in Grafana Enterprise that could allow attackers to...
Grafana Labs, a severe vulnerability in its SCIM provisioning feature that could allow attackers to escalate privileges or impersonate...
LONDON, Nov. 15, 2023 — At its annual ObservabilityCON in London, Grafana Labs is announcing a range of new updates to help make it easier...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Grafana Labs is https://grafana.com.
According to Rankiteo, Grafana Labs’s AI-generated cybersecurity score is 761, reflecting their Fair security posture.
According to Rankiteo, Grafana Labs currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Grafana Labs has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Grafana Labs is not certified under SOC 2 Type 1.
According to Rankiteo, Grafana Labs does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Grafana Labs is not listed as GDPR compliant.
According to Rankiteo, Grafana Labs does not currently maintain PCI DSS compliance.
According to Rankiteo, Grafana Labs is not compliant with HIPAA regulations.
According to Rankiteo,Grafana Labs is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Grafana Labs operates primarily in the Software Development industry.
Grafana Labs employs approximately 1,772 people worldwide.
Grafana Labs presently has no subsidiaries across any sectors.
Grafana Labs’s official LinkedIn profile has approximately 258,334 followers.
Grafana Labs is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Grafana Labs does not have a profile on Crunchbase.
Yes, Grafana Labs maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/grafana-labs.
As of January 21, 2026, Rankiteo reports that Grafana Labs has experienced 2 cybersecurity incidents.
Grafana Labs has an estimated 28,138 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01, and and containment measures with patch deployment (grafana enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6), containment measures with disabling scim provisioning, and remediation measures with software updates, remediation measures with configuration changes (disabling scim), and communication strategy with public security bulletin, communication strategy with customer advisories..
Title: Grafana Ghost Vulnerability (CVE-2025-4123)
Description: More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover.
Date Publicly Disclosed: 2023-05-21
Type: Vulnerability Exploitation
Attack Vector: Client-side open redirect
Vulnerability Exploited: CVE-2025-4123
Motivation: Account takeover, execution of malicious plugins
Title: Grafana Enterprise Privilege Escalation Vulnerability (CVE-2025-41115)
Description: Grafana Labs has disclosed a maximum severity vulnerability (CVE-2025-41115) in its Enterprise product that allows new users to be treated as administrators or enables privilege escalation when SCIM (System for Cross-domain Identity Management) provisioning is enabled. The flaw arises when both the 'enableSCIM' feature flag and 'user_sync_enabled' options are set to true, permitting a malicious or compromised SCIM client to provision a user with a numeric 'externalId' that maps to an internal account, including administrators. This could lead to impersonation or unauthorized privilege escalation. The issue was discovered during internal auditing on November 4, 2024, and patched within 24 hours. Public disclosure followed on November 19, 2024. Grafana Cloud services (including Amazon Managed Grafana and Azure Managed Grafana) were patched prior to disclosure, while self-managed installations require updates to versions 12.3.0, 12.2.1, 12.1.3, or 12.0.6. Grafana OSS users are unaffected.
Date Detected: 2024-11-04
Date Publicly Disclosed: 2024-11-19
Type: Vulnerability
Attack Vector: NetworkSCIM Provisioning Misconfiguration
Vulnerability Exploited: CVE-2025-41115 (Improper Mapping of SCIM 'externalId' to Internal 'user.uid')
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Systems Affected: 46,506 Grafana instances

Systems Affected: Grafana Enterprise (Self-Managed)
Operational Impact: Potential Unauthorized Administrative AccessImpersonation Risk
Brand Reputation Impact: Potential Erosion of Trust Due to Privilege Escalation Risk

Entity Name: Grafana Labs
Entity Type: Software Company
Industry: Technology

Entity Name: Grafana Labs
Entity Type: Organization
Industry: Software, Data Visualization, Monitoring
Location: Global

Remediation Measures: Upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01

Incident Response Plan Activated: True
Containment Measures: Patch Deployment (Grafana Enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6)Disabling SCIM Provisioning
Remediation Measures: Software UpdatesConfiguration Changes (Disabling SCIM)
Communication Strategy: Public Security BulletinCustomer Advisories
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01, Software Updates, Configuration Changes (Disabling SCIM), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by patch deployment (grafana enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6), disabling scim provisioning and .

Lessons Learned: Regularly update and patch software to mitigate vulnerabilities.

Lessons Learned: Importance of Secure Default Configurations for Preview Features, Rapid Patch Deployment for Critical Vulnerabilities, Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity)

Recommendations: Upgrade to the latest patched versions of Grafana.

Recommendations: Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.
Key Lessons Learned: The key lessons learned from past incidents are Regularly update and patch software to mitigate vulnerabilities.Importance of Secure Default Configurations for Preview Features,Rapid Patch Deployment for Critical Vulnerabilities,Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity).
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Upgrade to the latest patched versions of Grafana..

Source: BleepingComputer

Source: Grafana Labs Security Bulletin
Date Accessed: 2024-11-19

Source: GreyNoise Report on Grafana Scanning Activity
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: Grafana Labs Security BulletinDate Accessed: 2024-11-19, and Source: GreyNoise Report on Grafana Scanning Activity.

Investigation Status: Resolved (No Evidence of Exploitation in Grafana Cloud)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Security Bulletin and Customer Advisories.

Stakeholder Advisories: Customers Advised To Apply Patches Or Disable Scim.
Customer Advisories: Public security bulletin issued with mitigation steps
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Customers Advised To Apply Patches Or Disable Scim, Public Security Bulletin Issued With Mitigation Steps and .

Root Causes: Unpatched software, lack of awareness about the vulnerability
Corrective Actions: Apply security patches, increase user awareness about updates

Root Causes: Improper Mapping Of Scim 'Externalid' To Internal 'User.Uid' In Grafana Enterprise, Insufficient Validation Of Numeric 'Externalid' Values During User Provisioning, Preview Feature (Scim) Enabled Without Robust Safeguards,
Corrective Actions: Released Patched Versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) With Fixed Scim Provisioning Logic, Enhanced Input Validation For Scim Attributes, Proactive Communication To Customers About Risk And Mitigations,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Apply security patches, increase user awareness about updates, Released Patched Versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) With Fixed Scim Provisioning Logic, Enhanced Input Validation For Scim Attributes, Proactive Communication To Customers About Risk And Mitigations, .
Most Recent Incident Detected: The most recent incident detected was on 2024-11-04.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-11-19.
Most Significant System Affected: The most significant system affected in an incident was Grafana Enterprise (Self-Managed).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Patch Deployment (Grafana Enterprise 12.3.0, 12.2.1, 12.1.3 and 12.0.6)Disabling SCIM Provisioning.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor for unusual SCIM-related activity or privilege escalation attempts., Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Upgrade to the latest patched versions of Grafana., Review and audit user provisioning workflows, especially for identity management integrations. and Disable SCIM provisioning if not required..
Most Recent Source: The most recent source of information about an incident are BleepingComputer, Grafana Labs Security Bulletin and GreyNoise Report on Grafana Scanning Activity.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved (No Evidence of Exploitation in Grafana Cloud).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers advised to apply patches or disable SCIM, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Public security bulletin issued with mitigation steps.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Unpatched software, lack of awareness about the vulnerability, Improper mapping of SCIM 'externalId' to internal 'user.uid' in Grafana EnterpriseInsufficient validation of numeric 'externalId' values during user provisioningPreview feature (SCIM) enabled without robust safeguards.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Apply security patches, increase user awareness about updates, Released patched versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) with fixed SCIM provisioning logicEnhanced input validation for SCIM attributesProactive communication to customers about risk and mitigations.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.