<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2026-21722</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2026-21722</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-05T00:18:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-03-05T00:18:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-03-05T00:18:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2026-21722</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Public dashboards with annotations enabled did not limit their annotation timerange to the locked timerange of the public dashboard. This means one could read the entire history of annotations visible on the specific dashboard, even those outside the locked timerange.

This did not leak any annotations that would not otherwise be visible on the public dashboard.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP7" CPE="cpe:/o:suse:packagehub:15:sp7">SUSE Linux Enterprise Module for Package Hub 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools for SLE 12">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools for SLE 12">
        <FullProductName ProductID="SUSE Manager Client Tools for SLE 12" CPE="cpe:/o:suse:sle-manager-tools:12">SUSE Manager Client Tools for SLE 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools for SLE 15">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools for SLE 15">
        <FullProductName ProductID="SUSE Manager Client Tools for SLE 15" CPE="cpe:/o:suse:sle-manager-tools:15">SUSE Manager Client Tools for SLE 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Multi-Linux Manager Client Tools for SLE 12">
      <Branch Type="Product Name" Name="SUSE Multi-Linux Manager Client Tools for SLE 12">
        <FullProductName ProductID="SUSE Multi-Linux Manager Client Tools for SLE 12" CPE="cpe:/o:suse:multi-linux-managertools-sle:12">SUSE Multi-Linux Manager Client Tools for SLE 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Multi-Linux Manager Client Tools for SLE 15">
      <Branch Type="Product Name" Name="SUSE Multi-Linux Manager Client Tools for SLE 15">
        <FullProductName ProductID="SUSE Multi-Linux Manager Client Tools for SLE 15" CPE="cpe:/o:suse:multi-linux-managertools-sle:15">SUSE Multi-Linux Manager Client Tools for SLE 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="grafana">
      <FullProductName ProductID="grafana" CPE="cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*">grafana</FullProductName>
    </Branch>
    <Relationship ProductReference="grafana" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP7:grafana">grafana as a component of SUSE Linux Enterprise Module for Package Hub 15 SP7</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE 12">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE 12:grafana">grafana as a component of SUSE Manager Client Tools for SLE 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE 15">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE 15:grafana">grafana as a component of SUSE Manager Client Tools for SLE 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi-Linux Manager Client Tools for SLE 12">
      <FullProductName ProductID="SUSE Multi-Linux Manager Client Tools for SLE 12:grafana">grafana as a component of SUSE Multi-Linux Manager Client Tools for SLE 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana" RelationType="Default Component Of" RelatesToProductReference="SUSE Multi-Linux Manager Client Tools for SLE 15">
      <FullProductName ProductID="SUSE Multi-Linux Manager Client Tools for SLE 15:grafana">grafana as a component of SUSE Multi-Linux Manager Client Tools for SLE 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="grafana" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:grafana">grafana as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Public dashboards with annotations enabled did not limit their annotation timerange to the locked timerange of the public dashboard. This means one could read the entire history of annotations visible on the specific dashboard, even those outside the locked timerange.

This did not leak any annotations that would not otherwise be visible on the public dashboard.</Note>
    </Notes>
    <CVE>CVE-2026-21722</CVE>
    <ProductStatuses/>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>5.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
