Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Examples of more than 46,000 graphs in contact with account acquisition bug
    Security

    Examples of more than 46,000 graphs in contact with account acquisition bug

    PineapplesUpdateBy PineapplesUpdateJune 16, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Examples of more than 46,000 graphs in contact with account acquisition bug
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Examples of more than 46,000 graphs in contact with account acquisition bug

    Over 46,000 internet-focus graphs examples are unaffected and come in contact with a client-side open redirect vulnerability that allows a malicious plugin and account takeover to execute.

    Is tracked as a defect Cve-2025-4123 And influences several versions of the open-source platform used to monitor and imagine infrastructure and application matrix.

    Bug bunty huter discovered vulnerability Alvaro Balada And was addressed in Safety update The Greffana Labs was released on 21 May.

    However, as it is, one of all graphs has not been available on more than one third of the public internet, according to the researchers of the application security company Ox Security, who refer to the bug as ‘The Grafana Ghost’.

    Analysts told Bleepingcomputer that his work focused on demonstrating Balada’s discovery to make weapons.

    After identifying unsafe versions for the attack, he accepted the exposure by coringraizing data with the distribution of platforms in the ecosystem.

    He found that 128,864 examples were exposed online, still running weak versions with 46,506 which can still be exploited. It corresponds to a percentage of about 36%.

    Weak Grafana & Points till 13 June
    Weak graphna closing point
    Source: Bleepingcomputer

    The intensive analysis of Ox Security by CVE-2025-4123 revealed that, through a series of exploitation stages of combination of client-side path traverse with open redirect mechanics, the attacker can suffer in clicking the URL to click on the URL that leads to loading a malignant grafana plugin from a site controlled by the actor with danger.

    Mulnerable links can be used to arbitrarily perform JavaScript in the user’s browser, Researchers say,

    Exploitation process
    Exploitation process
    Source: Bull Security

    Exploitation does not require high privilements and may work even if it is able to reach anonymous.

    The blame allows the attackers to abduct user sessions, replace account credentials, and, in cases where graphna image render plugins have been installed, server-side request forms (SSRF) to read internal resources.

    While the default material safety policy (CSP) in Grafana provides some protection, it does not prevent exploitation due to boundaries in client-side enforcement.

    The exploitation of ox security suggests that client-side of CVE-2025-4123 can be exploited and it can be leveraged to bypass modern browser generalization mechanisms through JavaScript routing logic indigenous graphana.

    This allows the attackers to exploit URL handling discrepancies to serve malicious plugins, which in turn modify the email addresses, causing the account kidnapping through the password reset.

    Although the CVE-2025–4123 has many exploitation requirements, such as user interaction, an active user session when the victim clicks on the link, and the plugin feature is enabled (default is enabled), creates a significant attack surface.

    To reduce the risk of exploitation, it is recommended that the graphna administrator version 10.4.18+ security -01, 11.2.9+ security -01, 11.3.6+ security -01, 11.4.4+ security -01, 11.5.4+ security -01, 11.6.1+ security -01, and 12.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.


    Tines needle

    Patching meant complex scripts, long and endless fire drills. No more.

    In this new guide, the tines break down how it is leveling with modern organ automation. Patch fast, reduce overhead, and focus on strategic tasks – no complex script is required.

    account acquisition Bug contact examples graphs
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article4 Reasons I use 18 year old apps to copy and transfer files on Windows
    Next Article Turn GSD S10 Electric Cargo Bike Review: The Best Little Electric Cargo Bike
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How I used GPT-5.2-Codecs to solve a mystery bug and hosting nightmare in less than an hour

    January 19, 2026
    Startups

    I changed my Microsoft account password to Passkey – and you should too

    December 29, 2025
    Startups

    This Founder’s eBay Side Hustle Led to a $92 Million Acquisition

    November 14, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.