Bug 2374538 (CVE-2025-3415)

Summary: CVE-2025-3415 grafana: Exposure of DingDing alerting integration URL to Viewer level users
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: lchilton, sfeifer
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw exists in Grafana Alerting, where the DingDing contact-point integration URL can be revealed in plain text to users with viewer-level permissions due to misconfigured access control. This disclosure permits unauthorized users to view sensitive webhook URLs, including API tokens or keys, without needing elevated privileges.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2374546, 2374548    
Bug Blocks:    

Description OSIDB Bzimport 2025-06-24 11:41:51 UTC
An exposure vulnerability in Grafana Alerting’s DingDing integration reveals the full webhook URL including embedded API tokens or keys to users with Viewer-level access. The issue stems from insufficient access control, allowing unauthorized users to view sensitive integration details. This could enable attackers to send spoofed or malicious alerts via the DingDing channel without needing further authentication or interaction.

Impacted versions :Grafana versions <=12.0.1