{"vulnerability": "CVE-2022-23498", "sightings": [{"uuid": "33bb76d7-8955-4c1f-b186-cb07c31767b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23498", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6597", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-23498\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L)\n\ud83d\udd39 Description: Grafana is an open-source platform for monitoring and observability. When datasource query caching is enabled, Grafana caches all headers, including `grafana_session`. As a result, any user that queries a datasource where the caching is enabled can acquire another user\u2019s session. To mitigate the vulnerability you can disable datasource query caching for all datasources. This issue has been patched in versions 9.2.10 and 9.3.4.\n\n\ud83d\udccf Published: 2023-02-03T21:34:58.677Z\n\ud83d\udccf Modified: 2025-03-05T19:27:24.444Z\n\ud83d\udd17 References:\n1. https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", "creation_timestamp": "2025-03-05T20:01:17.000000Z"}]}