SB20260428200 - Multiple vulnerabilities in prometheus



SB20260428200 - Multiple vulnerabilities in prometheus

Published: April 28, 2026

Security Bulletin ID SB20260428200
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 vulnerabilities.


1) Cross-site scripting (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary JavaScript in the browser of a Prometheus user.

The vulnerability exists due to cross-site scripting in the histogram heatmap chart view of the legacy Prometheus web UI when rendering crafted histogram bucket label values in axis tick mark labels. A remote attacker can inject crafted metrics to execute arbitrary JavaScript in the browser of a Prometheus user.

Only instances with the legacy web UI enabled via the --enable-feature=old-ui flag are vulnerable.


2) Information disclosure (CVE-ID: CVE-2026-42151)

The vulnerability allows a remote attacker to disclose sensitive information.

The vulnerability exists due to exposure of sensitive information in the /-/config HTTP API endpoint when serving the Azure AD remote write OAuth configuration. A remote attacker can access the endpoint to disclose sensitive information.

Only deployments using Azure AD remote write with OAuth authentication are affected.


3) Uncontrolled Memory Allocation (CVE-ID: CVE-2026-42154)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to memory allocation with excessive size value in the remote read endpoint (/api/v1/read) when processing snappy-compressed request bodies. A remote attacker can send a specially crafted request body to cause a denial of service.

Concurrent exploitation can exhaust available memory and crash the Prometheus process.


Remediation

Install update from vendor's website.