Improper access control in Grafana - CVE-2026-33376
Published: May 18, 2026
Grafana
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass IP-based access restrictions for the Auth Proxy feature.
The vulnerability exists due to improper access control in the Auth Proxy IPv6 allow-list handling when evaluating IPv6 addresses without an explicitly specified mask. A remote attacker can use an IPv6 address that matches the unintended default /32 range to bypass IP-based access restrictions for the Auth Proxy feature.
Only the Auth Proxy feature is affected; other authentication methods such as Okta, SAML, and LDAP are unaffected.