CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 08, 2026

Grafana Patches AI Bug That Could Have Leaked User Data

Dark Reading Archived Apr 08, 2026 ✓ Full text saved

By hiding malicious instructions on an attacker-controlled Web page, AI could ingest orders as benign and return sensitive data to the attacker's server.

Full text archived locally
✦ AI Summary · Claude Sonnet


    APPLICATION SECURITY THREAT INTELLIGENCE СLOUD SECURITY DATA PRIVACY NEWS Grafana Patches AI Bug That Could Have Leaked User Data By hiding malicious instructions on an attacker-controlled Web page, AI could ingest orders as benign and return sensitive data to the attacker's server. Alexander Culafi,Senior News Writer,Dark Reading April 7, 2026 4 Min Read SOURCE: GK IMAGES VIA ALAMY STOCK PHOTO An issue with observability platform Grafana would have enabled attackers to trick its AI capabilities into leaking sensitive data. Grafana is a popular observability platform used to compile and track business data tied to finances, telemetry, operations, infrastructure, customer, and more. Because the platform's nature inherently connects it to the center of an organization's most valuable information, compromising a Grafana instance could prove devastating.  AI security vendor Noma today published research concerning "GrafanaGhost," an indirect prompt injection attack researchers discovered that could allow a threat actor to exfiltrate data.  The attack leans on how Grafana's AI components process information. In short, an attacker would hide malicious instructions on a Web page they control, and through trickery in terms of how the instructions are presented, the AI ingests the orders as benign and inadvertently sends requested sensitive data back to an attacker-controlled server.  Related:AI-Assisted Supply Chain Attack Targets GitHub The user of Grafana's AI assistant would access an attacker-crafted URL path and Grafana would ingest the prompt as soon as a malicious image file began to load. The core technical issue enabling GrafanaGhost has been patched. How GrafanaGhost Works The prompt injection resulted from Noma wanting to know where a user could potentially interact with Grafana's AI components, as anything user-facing is an opportunity for a prompt injection attack. After some troubleshooting, Noma found where indirect prompts are processed and identified image tags as a viable avenue for making a malicious command. Although external images have protections on them to prevent attacks like this, researchers managed to bypass said protections by using protocol-relative URLs to circumvent domain validation and the "INTENT" keyword to disable AI model guardrails, which at the time caused Grafana to inadvertently see an external prompt as benign.  With the right setup, data is exfiltrated with the victim unaware as soon as the image starts being rendered.  As Sasi Levi, security research lead at Noma Security, tells Dark Reading, this doesn't necessarily require getting a defender to click a link that loads a malicious page. "[The attacker needs] to get their indirect prompt stored in a location that Grafana's AI components will later retrieve and process," he says. "Once that payload is sitting in the data store, it waits and fires automatically when any user performs a normal interaction with their Grafana instance (like browsing entry logs). The user is the unwitting trigger, not the target of a phishing attempt. That's what makes it so stealthy." Related:OWASP GenAI Security Project Gets Update, New Tools Matrix Noma praised Grafana for its response. After Noma followed responsible disclosure protocols, Grafana "jumped on the issue immediately, worked closely with us to validate the findings, and rolled out a fix as fast as possible to secure their users." Grafana Responds to GrafanaGhost Grafana Labs chief information security officer (CISO) Joe McManus tells Dark Reading in an email that Noma's research highlighted an issue with Grafana's image renderer in its Markdown component, which was "quickly patched." However, the company disputes the claim that the attack constitutes "zero-click," as Noma described it, or that it could operate silently and autonomously in the background. "Any successful execution of this exploit would have required significant user interaction — specifically, the end user would have to repeatedly instruct our AI assistant to follow malicious instructions contained in logs, even after the AI assistant made the user aware of the malicious instructions," McManus says. "We emphasize that there is no evidence of this bug having been exploited in the wild, and no data was leaked from Grafana Cloud."  Related:Claude Source Code Leak Highlights Big Supply Chain Missteps Noma's Levi responded to Grafana's claims over email. He tells Dark Reading that the exploit requires "fewer than two steps" and that the AI never surfaced any warning to the user about the presence of malicious instructions in the entry log.  "There was no alert, no flag, no prompt asking the user to confirm. The model processed the indirect prompt injection autonomously, interpreting the log content as legitimate context and acting on it silently, without restriction, and without notifying the user that anything unusual was occurring," Levi says. "The user had no visibility into what was happening in the background and no opportunity to intervene." He continues, "We respect Grafana's quick response to the patch and their commitment to user security. But we can't let an inaccurate characterization of the exploit mechanics stand unchallenged. The findings are documented, and we're confident in what the research shows." About the Author Alexander Culafi Senior News Writer, Dark Reading Alex is an award-winning writer, journalist, and podcast host based in Boston. After cutting his teeth writing for independent gaming publications as a teenager, he graduated from Emerson College in 2016 with a Bachelor of Science in journalism. He has previously been published on VentureFizz, Search Security, Nintendo World Report, and elsewhere. In his spare time, Alex hosts the weekly Nintendo podcast Talk Nintendo Podcast and works on personal writing projects, including two previously self-published science fiction novels. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need More Webinars You May Also Like APPLICATION SECURITY Self-Propagating GlassWorm Attacks VS Code Supply Chain by Elizabeth Montalbano, Contributing Writer OCT 20, 2025 APPLICATION SECURITY 'Lies-in-the-Loop' Attack Defeats AI Coding Agents by Elizabeth Montalbano, Contributing Writer SEP 15, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 APPLICATION SECURITY Microsoft Drops Another Massive Patch Update by Jai Vijayan, Contributing Writer APR 08, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 CYBERATTACKS & DATA BREACHES Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate byNate Nelson APR 2, 2026 3 MIN READ ENDPOINT SECURITY CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry byJeffrey Schwartz APR 3, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗