The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a single URL decode, by double encoding, an attacker can read files at the Ruler API endpoint /loki/api/v1/rules/{namespace}
Thanks to Prasanth Sundararajan for reporting this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Grafana
Grafana loki |
|
| Vendors & Products |
Grafana
Grafana loki |
Wed, 15 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The CVE-2021-36156 fix validates the namespace parameter for path traversal sequences after a single URL decode, by double encoding, an attacker can read files at the Ruler API endpoint /loki/api/v1/rules/{namespace} Thanks to Prasanth Sundararajan for reporting this vulnerability. | |
| Title | Loki Path Traversal - CVE-2021-36156 Bypass | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GRAFANA
Published:
Updated: 2026-04-15T20:01:33.375Z
Reserved: 2026-01-05T09:26:06.215Z
Link: CVE-2026-21726
Updated: 2026-04-15T20:01:29.185Z
Status : Received
Published: 2026-04-15T20:16:34.177
Modified: 2026-04-15T20:16:34.177
Link: CVE-2026-21726
No data.
OpenCVE Enrichment
Updated: 2026-04-15T21:30:13Z