{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33375","assignerOrgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","state":"PUBLISHED","assignerShortName":"GRAFANA","dateReserved":"2026-03-19T07:55:06.977Z","datePublished":"2026-03-26T20:05:52.564Z","dateUpdated":"2026-05-13T19:28:42.782Z"},"containers":{"cna":{"providerMetadata":{"orgId":"57da9224-a3e2-4646-9d0e-c4dc2e05e7da","shortName":"GRAFANA","dateUpdated":"2026-05-13T19:28:42.782Z"},"datePublic":"2026-03-26T12:52:32.117Z","title":"Grafana MSSQL Data Source Plugin: Restriction Bypass Leading to OOM DoS","descriptions":[{"lang":"en","value":"The Grafana MSSQL data source plugin contains a logic flaw that allows a low-privileged user (Viewer) to bypass API restrictions and trigger a catastrophic Out-Of-Memory (OOM) memory exhaustion, crashing the host container."}],"affected":[{"vendor":"Grafana","product":"Grafana OSS","platforms":["OnPrem"],"defaultStatus":"unaffected","versions":[{"version":"11.6.0","status":"affected","versionType":"semver","lessThan":"11.6.14+security-01"},{"version":"12.1.0","status":"affected","versionType":"semver","lessThan":"12.1.10+security-01"},{"version":"12.2.0","status":"affected","versionType":"semver","lessThan":"12.2.8+security-01"},{"version":"12.3.0","status":"affected","versionType":"semver","lessThan":"12.3.6+security-01"},{"version":"12.4.0","status":"affected","versionType":"semver","lessThan":"12.4.2"}]}],"references":[{"url":"https://grafana.com/security/security-advisories/cve-2026-33375","tags":["vendor-advisory"]}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}}],"source":{"discovery":"BUG_BOUNTY"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-400","lang":"en","description":"CWE-400 Uncontrolled Resource Consumption"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-27T14:39:23.654250Z","id":"CVE-2026-33375","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-27T14:40:37.122Z"}}]}}