{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-41117","title":"Title"},{"category":"description","text":"Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field.\n\nOnly datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-41117","url":"https://www.suse.com/security/cve/CVE-2025-41117"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1258137 for CVE-2025-41117","url":"https://bugzilla.suse.com/1258137"}],"title":"SUSE CVE CVE-2025-41117","tracking":{"current_release_date":"2026-02-13T00:30:36Z","generator":{"date":"2026-02-13T00:30:36Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-41117","initial_release_date":"2026-02-13T00:30:36Z","revision_history":[{"date":"2026-02-13T00:30:36Z","number":"2","summary":"vulnerabilities added,references added,severity changed from  to moderate"}],"status":"interim","version":"2"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Module for Package Hub 15 SP7","product":{"name":"SUSE Linux Enterprise Module for Package Hub 15 SP7","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP7","product_identification_helper":{"cpe":"cpe:/o:suse:packagehub:15:sp7"}}},{"category":"product_name","name":"SUSE Manager Client Tools for SLE 12","product":{"name":"SUSE Manager Client Tools for SLE 12","product_id":"SUSE Manager Client Tools for SLE 12","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools:12"}}},{"category":"product_name","name":"SUSE Manager Client Tools for SLE 15","product":{"name":"SUSE Manager Client Tools for SLE 15","product_id":"SUSE Manager Client Tools for SLE 15","product_identification_helper":{"cpe":"cpe:/o:suse:sle-manager-tools:15"}}},{"category":"product_name","name":"SUSE Multi-Linux Manager Client Tools for SLE 12","product":{"name":"SUSE Multi-Linux Manager Client Tools for SLE 12","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 12","product_identification_helper":{"cpe":"cpe:/o:suse:multi-linux-managertools-sle:12"}}},{"category":"product_name","name":"SUSE Multi-Linux Manager Client Tools for SLE 15","product":{"name":"SUSE Multi-Linux Manager Client Tools for SLE 15","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 15","product_identification_helper":{"cpe":"cpe:/o:suse:multi-linux-managertools-sle:15"}}},{"category":"product_name","name":"openSUSE Leap 15.6","product":{"name":"openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.6"}}},{"category":"product_version","name":"grafana","product":{"name":"grafana","product_id":"grafana","product_identification_helper":{"cpe":"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/grafana@?upstream=grafana.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Linux Enterprise Module for Package Hub 15 SP7","product_id":"SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Linux Enterprise Module for Package Hub 15 SP7"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Manager Client Tools for SLE 12","product_id":"SUSE Manager Client Tools for SLE 12:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Manager Client Tools for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Manager Client Tools for SLE 15","product_id":"SUSE Manager Client Tools for SLE 15:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Manager Client Tools for SLE 15"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Multi-Linux Manager Client Tools for SLE 12","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 12:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Multi-Linux Manager Client Tools for SLE 12"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of SUSE Multi-Linux Manager Client Tools for SLE 15","product_id":"SUSE Multi-Linux Manager Client Tools for SLE 15:grafana"},"product_reference":"grafana","relates_to_product_reference":"SUSE Multi-Linux Manager Client Tools for SLE 15"},{"category":"default_component_of","full_product_name":{"name":"grafana as component of openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6:grafana"},"product_reference":"grafana","relates_to_product_reference":"openSUSE Leap 15.6"}]},"vulnerabilities":[{"cve":"CVE-2025-41117","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-41117"}],"notes":[{"category":"general","text":"Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field.\n\nOnly datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.","title":"CVE description"}],"product_status":{"known_not_affected":["SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana","SUSE Manager Client Tools for SLE 12:grafana","SUSE Manager Client Tools for SLE 15:grafana","SUSE Multi-Linux Manager Client Tools for SLE 12:grafana","SUSE Multi-Linux Manager Client Tools for SLE 15:grafana","openSUSE Leap 15.6:grafana"]},"references":[{"category":"external","summary":"CVE-2025-41117","url":"https://www.suse.com/security/cve/CVE-2025-41117"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1258137 for CVE-2025-41117","url":"https://bugzilla.suse.com/1258137"}],"threats":[{"category":"impact","date":"2026-02-12T11:02:23Z","details":"moderate"}],"title":"CVE-2025-41117"}]}