CVE-2024-9264
Grafana SQL Expressions allow for remote code execution
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- September 26, 2024
- Published Date
- October 18, 2024
- Last Updated
- March 14, 2025
- Vendor
- Grafana
- Product
- Grafana
- Description
- The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
- Tags
- Score
- 92.34% (Percentile: 99.71%) as of 2025-06-17
- Exploitation
- poc
- Technical Impact
- total
- Exploited in the Wild
- Yes (2025-05-19 15:29:36 UTC) Source
CVSS Scores
CVSS v4.0
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score
SSVC Information
Exploit Status
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-19 18:00:16 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9264.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
z3k0sec/CVE-2024-9264-RCE-Exploit
Type: github • Created: 2024-10-21 03:36:05 UTC • Stars: 15
z3k0sec/File-Read-CVE-2024-9264
Type: github • Created: 2024-10-20 01:13:37 UTC • Stars: 6
nollium/CVE-2024-9264
Type: github • Created: 2024-10-19 13:50:52 UTC • Stars: 91
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel