CVE-2024-9264

Grafana SQL Expressions allow for remote code execution

Basic Information

CVE State
PUBLISHED
Reserved Date
September 26, 2024
Published Date
October 18, 2024
Last Updated
March 14, 2025
Vendor
Grafana
Product
Grafana
Description
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
Tags
nuclei_scanner

CVSS Scores

CVSS v4.0

9.4 - CRITICAL

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CVSS v3.1

9.9 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

Score
92.34% (Percentile: 99.71%) as of 2025-06-17

SSVC Information

Exploitation
poc
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-05-19 15:29:36 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-19 18:00:16 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

z3k0sec/CVE-2024-9264-RCE-Exploit

Type: github • Created: 2024-10-21 03:36:05 UTC • Stars: 15

Grafana RCE exploit (CVE-2024-9264)

z3k0sec/File-Read-CVE-2024-9264

Type: github • Created: 2024-10-20 01:13:37 UTC • Stars: 6

File Read Proof of Concept for CVE-2024-9264

nollium/CVE-2024-9264

Type: github • Created: 2024-10-19 13:50:52 UTC • Stars: 91

Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel