CVE-2026-42151

ADVISORY - github

Summary

Impact

Users who use Azure AD remote write with OAuth authentication are impacted.

The client_secret field in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed as string instead of Secret. Prometheus redacts fields of type Secret when serving the configuration via the /-/config HTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint.

Patches

The problem has been patched by changing ClientSecret in OAuthConfig to Secret. Users should upgrade to 3.11.3 or 3.5.3 LTS.

Workarounds

Users who can not upgrade can switch to Managed Identity or Workload Identity authentication for Azure AD remote write, which do not involve a client secret.

EPSS Score: 0.0001 (0.013)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Exposure of Sensitive Information to an Unauthorized Actor

Cleartext Storage of Sensitive Information

ADVISORY - github

Exposure of Sensitive Information to an Unauthorized Actor

Cleartext Storage of Sensitive Information


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in