Grafana through 6.7.1 allows stored XSS. Reference: https://github.com/grafana/grafana/blob/master/CHANGELOG.md#672-2020-04-02
Upstream patch: https://github.com/grafana/grafana/commit/fb114a75241aaef4c08581b42509c750738b768a
Statement: Both OpenShift 3.11 and 4.x grafana-container's package a vulnerable version of grafana. However the grafana instance is set to read-only meaning that the potential XSS attack cannot be performed because the original url field cannot be modified. Access to the grafana panel is additionally behind OpenShift OAuth proxy and requires admin permissions. As OpenShift still packages the vulnerable code, the components are affected but the impact is Low.
OpenShift ServiceMesh packages a vulnerable version of grafana (v6.4.3) in the container, openshift-service-mesh/grafana-rhel8.
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.6 Via RHSA-2020:4298 https://access.redhat.com/errata/RHSA-2020:4298
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-11110
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4682 https://access.redhat.com/errata/RHSA-2020:4682