CVE-2026-42151 PUBLISHED

Prometheus Azure AD remote write OAuth client secret exposed via config API

Assigner: GitHub_M
Reserved: 24.04.2026 Published: 04.05.2026 Updated: 04.05.2026

Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint. This issue has been patched in versions 3.5.3 and 3.11.3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 7.5

Product Status

Vendor prometheus
Product prometheus
Versions
  • Version < 3.5.3 is affected
  • Version >= 3.6.0, < 3.11.3 is affected

References

Problem Types

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE
  • CWE-312: Cleartext Storage of Sensitive Information CWE