Grafana Patches Critical SCIM Flaw Enabling Impersonation and Privilege Escalation
- Nov 22, 2025
- 2 min read
Key Findings
Grafana has patched a critical vulnerability (CVE-2025-41115) in its SCIM (System for Cross-domain Identity Management) implementation with a CVSS score of 10.0.
The flaw could allow a malicious or compromised SCIM client to provision a user with a numeric `externalId`, enabling potential impersonation or privilege escalation under certain configurations.
The vulnerability affects Grafana Enterprise versions from 12.0.0 to 12.2.1 and has been addressed in Grafana Enterprise 12.0.6+security-01, 12.1.3+security-01, 12.2.1+security-01, and 12.3.0.
Background
SCIM is a standard that allows automated user provisioning and management in Grafana Enterprise.
The vulnerability was discovered internally by Grafana on November 4, 2025, during an audit and testing process.
Successful exploitation requires the `enableSCIM` feature flag to be set to `true` and the `user_sync_enabled` config option in the `[auth.scim]` block to also be set to `true`.
Technical Details
Grafana maps the SCIM `externalId` directly to the internal `user.uid`, and numeric values (e.g., '1') may be interpreted as internal numeric user IDs.
In specific cases, this could allow the newly provisioned user to be treated as an existing internal account, such as the Admin, leading to potential impersonation or privilege escalation.
Mitigation and Remediation
Grafana has released security updates to address the vulnerability in the following versions:
Grafana Enterprise 12.0.6+security-01
Grafana Enterprise 12.1.3+security-01
Grafana Enterprise 12.2.1+security-01
Grafana Enterprise 12.3.0
Users are advised to apply the patches as soon as possible to mitigate potential risks.
Impact and Implications
The vulnerability carries a maximum severity CVSS score of 10.0, indicating the critical nature of the flaw.
Successful exploitation could lead to impersonation of existing users, including the Admin, and potential privilege escalation.
The vulnerability was discovered and patched internally, highlighting Grafana's proactive approach to security.
Conclusion
Grafana has acted swiftly to address a critical vulnerability in its SCIM implementation that could have allowed malicious actors to impersonate users and escalate privileges. Users are strongly encouraged to update their Grafana Enterprise instances to the patched versions to ensure the security and integrity of their systems.
Sources
https://thehackernews.com/2025/11/grafana-patches-cvss-100-scim-flaw.html
https://x.com/Dinosn/status/1991921651139981425
https://securityonline.info/grafana-patches-critical-scim-flaw-cve-2025-41115-cvss-10-allowing-privilege-escalation-and-user-impersonation/
https://www.linkedin.com/posts/lorenzogomezvargas_grafana-patches-cvss-100-scim-flaw-enabling-activity-7397718049186914304-OJ7T


Comments