CVE-2026-42154 PUBLISHED

Prometheus: remote read endpoint allows denial of service via crafted snappy payload

Assigner: GitHub_M
Reserved: 24.04.2026 Published: 04.05.2026 Updated: 04.05.2026

Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor prometheus
Product prometheus
Versions
  • Version < 3.5.3 is affected
  • Version >= 3.6.0, < 3.11.3 is affected

References

Problem Types

  • CWE-400: Uncontrolled Resource Consumption CWE
  • CWE-789: Memory Allocation with Excessive Size Value CWE