Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
History

Thu, 30 Oct 2025 18:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L'}

cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L'}


Tue, 03 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Aug 2024 18:00:00 +0000

Type Values Removed Values Added
Description Access control for plugin data sources protected by the ReqActions json field of the plugin.json is bypassed if the user or service account is granted associated access to any other data source, as the ReqActions check was not scoped to each specific datasource. The account must have prior query access to the impacted datasource.
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published: 2024-08-20T17:52:06.232Z

Updated: 2025-10-30T17:55:02.115Z

Reserved: 2024-06-25T13:25:06.436Z

Link: CVE-2024-6322

cve-icon Vulnrichment

Updated: 2024-09-03T17:04:35.433Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-20T18:15:09.900

Modified: 2025-10-30T18:15:31.740

Link: CVE-2024-6322

cve-icon Redhat

No data.