{"api_version":"1","generated_at":"2026-05-06T13:47:14+00:00","cve":"CVE-2026-42151","urls":{"html":"https://cve.report/CVE-2026-42151","api":"https://cve.report/api/cve/CVE-2026-42151.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42151","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42151"},"summary":{"title":"Prometheus Azure AD remote write OAuth client secret exposed via config API","description":"Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-04 19:16:04","updated_at":"2026-05-04 19:16:04"},"problem_types":["CWE-200","CWE-312","CWE-200 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","CWE-312 CWE-312: Cleartext Storage of Sensitive Information"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/prometheus/prometheus/pull/18587","name":"https://github.com/prometheus/prometheus/pull/18587","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/prometheus/prometheus/releases/tag/v3.5.3","name":"https://github.com/prometheus/prometheus/releases/tag/v3.5.3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/prometheus/prometheus/pull/18590","name":"https://github.com/prometheus/prometheus/pull/18590","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/prometheus/prometheus/security/advisories/GHSA-wg65-39gg-5wfj","name":"https://github.com/prometheus/prometheus/security/advisories/GHSA-wg65-39gg-5wfj","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/prometheus/prometheus/releases/tag/v3.11.3","name":"https://github.com/prometheus/prometheus/releases/tag/v3.11.3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42151","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42151","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"prometheus","product":"prometheus","version":"affected < 3.5.3","platforms":[]},{"source":"CNA","vendor":"prometheus","product":"prometheus","version":"affected >= 3.6.0, < 3.11.3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"42151","cve":"CVE-2026-42151","epss":"0.000100000","percentile":"0.012560000","score_date":"2026-05-05","updated_at":"2026-05-06 00:08:09"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"prometheus","vendor":"prometheus","versions":[{"status":"affected","version":"< 3.5.3"},{"status":"affected","version":">= 3.6.0, < 3.11.3"}]}],"descriptions":[{"lang":"en","value":"Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-312","description":"CWE-312: Cleartext Storage of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-04T18:12:16.917Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/prometheus/prometheus/security/advisories/GHSA-wg65-39gg-5wfj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/prometheus/prometheus/security/advisories/GHSA-wg65-39gg-5wfj"},{"name":"https://github.com/prometheus/prometheus/pull/18587","tags":["x_refsource_MISC"],"url":"https://github.com/prometheus/prometheus/pull/18587"},{"name":"https://github.com/prometheus/prometheus/pull/18590","tags":["x_refsource_MISC"],"url":"https://github.com/prometheus/prometheus/pull/18590"},{"name":"https://github.com/prometheus/prometheus/releases/tag/v3.11.3","tags":["x_refsource_MISC"],"url":"https://github.com/prometheus/prometheus/releases/tag/v3.11.3"},{"name":"https://github.com/prometheus/prometheus/releases/tag/v3.5.3","tags":["x_refsource_MISC"],"url":"https://github.com/prometheus/prometheus/releases/tag/v3.5.3"}],"source":{"advisory":"GHSA-wg65-39gg-5wfj","discovery":"UNKNOWN"},"title":"Prometheus Azure AD remote write OAuth client secret exposed via config API"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42151","datePublished":"2026-05-04T18:12:16.917Z","dateReserved":"2026-04-24T17:15:21.835Z","dateUpdated":"2026-05-04T18:12:16.917Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-04 19:16:04","lastModifiedDate":"2026-05-04 19:16:04","problem_types":["CWE-200","CWE-312","CWE-200 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","CWE-312 CWE-312: Cleartext Storage of Sensitive Information"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42151","Ordinal":"1","Title":"Prometheus Azure AD remote write OAuth client secret exposed via","CVE":"CVE-2026-42151","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42151","Ordinal":"1","NoteData":"Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.","Type":"Description","Title":"Prometheus Azure AD remote write OAuth client secret exposed via"}]}}}