The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-42151

CVE-2026-42151: Prometheus Information Disclosure Flaw

CVE-2026-42151 is an information disclosure vulnerability in Prometheus that exposes Azure OAuth client secrets in plaintext through the configuration API. This article covers technical details, affected versions, and mitigation.

Published: May 7, 2026

CVE-2026-42151 Overview

CVE-2026-42151 is an information disclosure vulnerability in Prometheus, the open-source monitoring system and time series database. The flaw exists in the Azure Active Directory (Azure AD) remote write OAuth configuration handler at storage/remote/azuread. The client_secret field was typed as string instead of Secret, causing Prometheus to skip its standard redaction logic when serving configuration through the /-/config HTTP API endpoint. Any user or process with access to that endpoint could read the Azure OAuth client secret in plaintext. The issue is fixed in Prometheus versions 3.5.3 and 3.11.3.

Critical Impact

Attackers with access to the Prometheus configuration endpoint can retrieve Azure AD OAuth client secrets in cleartext, enabling impersonation of the Prometheus remote write identity against Azure resources.

Affected Products

  • Prometheus versions prior to 3.5.3 (3.5.x branch)
  • Prometheus versions prior to 3.11.3 (3.11.x branch)
  • Prometheus deployments using Azure AD OAuth for remote write storage

Discovery Timeline

  • 2026-05-04 - CVE-2026-42151 published to NVD
  • 2026-05-07 - Last updated in NVD database

Technical Details for CVE-2026-42151

Vulnerability Analysis

Prometheus supports remote write to long-term storage backends, including Azure-hosted services authenticated via Azure AD OAuth. Operators configure a client_id and client_secret in the Prometheus YAML configuration file. Prometheus uses a Go type named Secret for sensitive fields, and its serializer replaces values of that type with <secret> when the configuration is rendered through the /-/config API endpoint.

In the affected versions, the client_secret field inside the Azure AD remote write OAuth struct was declared as a plain Go string. The redaction logic only triggers on the Secret type, so the field bypassed sanitization. As a result, the full plaintext OAuth client secret was returned to anyone able to query /-/config. This vulnerability is classified as Information Exposure under [CWE-200].

Root Cause

The root cause is an incorrect type declaration in the OAuth configuration struct under storage/remote/azuread. Using a primitive string type instead of the config.Secret wrapper disables the type-driven redaction performed by the Prometheus configuration serializer. The fix, delivered in GitHub Pull Request #18587 and GitHub Pull Request #18590, retypes the field to Secret so the existing redaction path applies.

Attack Vector

The vulnerability is exploitable over the network without authentication when the Prometheus HTTP API is reachable to the attacker. An attacker issues an HTTP GET to /-/config and parses the YAML response. The returned configuration contains the Azure AD client_secret in cleartext under the remote write OAuth section. The attacker then uses the credential to obtain Azure AD access tokens for the application registration tied to that secret, gaining the privileges granted to the Prometheus remote write identity.

No verified public exploit code is referenced in the advisory. Refer to GitHub Security Advisory GHSA-wg65-39gg-5wfj for vendor details.

Detection Methods for CVE-2026-42151

Indicators of Compromise

  • HTTP GET requests to the /-/config endpoint of Prometheus servers from unexpected source addresses or user agents.
  • Azure AD sign-in logs showing token requests for the Prometheus application registration from IP addresses outside the Prometheus host range.
  • Configuration responses from /-/config that include a non-redacted client_secret value under azuread.oauth, confirming an unpatched instance.

Detection Strategies

  • Audit running Prometheus binaries and container images for versions older than 3.5.3 or 3.11.3 across the fleet.
  • Query /-/config on each instance and grep for client_secret: followed by any value other than <secret>.
  • Correlate web access logs for /-/config requests with identity provider logs for Azure AD application token issuance.

Monitoring Recommendations

  • Forward Prometheus access logs and Azure AD sign-in logs to a centralized SIEM or data lake for cross-source correlation.
  • Alert on any unauthenticated access to Prometheus management endpoints, including /-/config, /-/reload, and /api/v1/status/config.
  • Track Azure AD application secret usage patterns and alert on token requests from new geographies or autonomous systems.

How to Mitigate CVE-2026-42151

Immediate Actions Required

  • Upgrade Prometheus to version 3.5.3 or 3.11.3 as published in GitHub Release v3.5.3 and GitHub Release v3.11.3.
  • Rotate the Azure AD application client secret used by Prometheus remote write, since prior values must be considered compromised on any exposed instance.
  • Restrict network access to Prometheus HTTP endpoints to trusted operator subnets and authenticated reverse proxies.
  • Review Azure AD audit logs for unexpected token issuance against the Prometheus application registration.

Patch Information

The Prometheus maintainers fixed the vulnerability by retyping the client_secret field to Secret in the Azure AD OAuth configuration. The patches are merged in GitHub Pull Request #18587 and GitHub Pull Request #18590, and shipped in releases 3.5.3 and 3.11.3. Operators on older 3.x branches should upgrade to one of these fixed releases.

Workarounds

  • Place Prometheus behind an authenticating reverse proxy and deny all external access to the /-/config endpoint until the upgrade is applied.
  • Bind the Prometheus HTTP listener to localhost or a management-only interface using --web.listen-address.
  • Disable Azure AD OAuth on remote write and switch to an alternative authentication method, such as managed identity, where feasible.
bash
# Restrict /-/config exposure with an nginx reverse proxy fronting Prometheus
location = /-/config {
    deny all;
    return 403;
}

location / {
    auth_basic "Prometheus";
    auth_basic_user_file /etc/nginx/.htpasswd;
    proxy_pass http://127.0.0.1:9090;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechPrometheus

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-200
  • Technical References
  • GitHub Pull Request #18587

  • GitHub Pull Request #18590

  • GitHub Release v3.11.3

  • GitHub Release v3.5.3

  • GitHub Security Advisory GHSA-wg65-39gg-5wfj
  • Related CVEs
  • CVE-2026-42154: Prometheus DOS Vulnerability

  • CVE-2026-40179: Prometheus Monitoring System XSS Vulnerability

  • CVE-2022-21698: Prometheus Client Golang DoS Vulnerability

  • CVE-2021-29622: Prometheus Open Redirect Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English