Prometheus Azure AD remote write OAuth client secret exposed via config API
Summary
| CVE | CVE-2026-42151 |
|---|---|
| State | PUBLISHED |
| Assigner | GitHub_M |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-04 19:16:04 UTC |
| Updated | 2026-05-04 19:16:04 UTC |
| Description | Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3. |
Risk And Classification
Primary CVSS: v3.1 7.5 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS: 0.000100000 probability, percentile 0.012560000 (date 2026-05-05)
Problem Types: CWE-200 | CWE-312 | CWE-200 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor | CWE-312 CWE-312: Cleartext Storage of Sensitive Information
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| 3.1 | CNA | DECLARED | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Prometheus | Prometheus | affected < 3.5.3 | Not specified |
| CNA | Prometheus | Prometheus | affected >= 3.6.0, < 3.11.3 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/prometheus/prometheus/pull/18587 | [email protected] | github.com | |
| github.com/prometheus/prometheus/releases/tag/v3.5.3 | [email protected] | github.com | |
| github.com/prometheus/prometheus/pull/18590 | [email protected] | github.com | |
| github.com/prometheus/prometheus/security/advisories/GHSA-wg65-39gg-5wfj | [email protected] | github.com | |
| github.com/prometheus/prometheus/releases/tag/v3.11.3 | [email protected] | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.