Prometheus Azure AD remote write OAuth client secret exposed via config API
Package
Affected versions
>= 0.45.2, < 0.311.3
Patched versions
0.311.3
Description
Published by the National Vulnerability Database
May 4, 2026
Published to the GitHub Advisory Database
May 5, 2026
Reviewed
May 5, 2026
Last updated
May 5, 2026
Impact
Users who use Azure AD remote write with OAuth authentication are impacted.
The
client_secretfield in the Azure AD remote write OAuth configuration (storage/remote/azuread) was typed asstringinstead ofSecret. Prometheus redacts fields of typeSecretwhen serving the configuration via the/-/configHTTP API endpoint. Because the field was a plain string, the Azure OAuth client secret was exposed in plaintext to any user or process with access to that endpoint.Patches
The problem has been patched by changing
ClientSecretinOAuthConfigtoSecret. Users should upgrade to 3.11.3 or 3.5.3 LTS.Workarounds
Users who can not upgrade can switch to Managed Identity or Workload Identity authentication for Azure AD remote write, which do not involve a client secret.
References