Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/prometheus@2.42.0%2Bds-5?distro=trixie
Typedeb
Namespacedebian
Nameprometheus
Version2.42.0+ds-5
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.53.3+ds1-2
Latest_non_vulnerable_version2.53.5+ds1-4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1s7q-drqn-4bhd
vulnerability_id VCID-1s7q-drqn-4bhd
summary
Withdrawn Advisory: Prometheus XSS Vulnerability
## Withdrawn Advisory
This advisory has been withdrawn because the vulnerability does not apply to the Prometheus golang package. This link is maintained to preserve external references.

## Original Description
A stored, DOM based, cross-site scripting (XSS) flaw was found in Prometheus before version 2.7.1. An attacker could exploit this by convincing an authenticated user to visit a crafted URL on a Prometheus server, allowing for the execution and persistent storage of arbitrary scripts.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3826.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3826.json
2
reference_url https://advisory.checkmarx.net/advisory/CX-2019-4297
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://advisory.checkmarx.net/advisory/CX-2019-4297
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3826
reference_id
reference_type
scores
0
value 0.01462
scoring_system epss
scoring_elements 0.80827
published_at 2026-04-07T12:55:00Z
1
value 0.01462
scoring_system epss
scoring_elements 0.80899
published_at 2026-04-21T12:55:00Z
2
value 0.01462
scoring_system epss
scoring_elements 0.80897
published_at 2026-04-18T12:55:00Z
3
value 0.01462
scoring_system epss
scoring_elements 0.80895
published_at 2026-04-16T12:55:00Z
4
value 0.01462
scoring_system epss
scoring_elements 0.80858
published_at 2026-04-13T12:55:00Z
5
value 0.01462
scoring_system epss
scoring_elements 0.80866
published_at 2026-04-12T12:55:00Z
6
value 0.01462
scoring_system epss
scoring_elements 0.8088
published_at 2026-04-11T12:55:00Z
7
value 0.01462
scoring_system epss
scoring_elements 0.80801
published_at 2026-04-01T12:55:00Z
8
value 0.01462
scoring_system epss
scoring_elements 0.80864
published_at 2026-04-09T12:55:00Z
9
value 0.01462
scoring_system epss
scoring_elements 0.80855
published_at 2026-04-08T12:55:00Z
10
value 0.01462
scoring_system epss
scoring_elements 0.80811
published_at 2026-04-02T12:55:00Z
11
value 0.01462
scoring_system epss
scoring_elements 0.80831
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3826
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3826
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3826
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3826
6
reference_url https://github.com/aquasecurity/trivy/issues/2992
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/aquasecurity/trivy/issues/2992
7
reference_url https://github.com/prometheus/prometheus/commit/62e591f9
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/prometheus/prometheus/commit/62e591f9
8
reference_url https://github.com/prometheus/prometheus/pull/5163
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/prometheus/prometheus/pull/5163
9
reference_url https://github.com/prometheus/prometheus/pull/5163/commits/ea254eea5e3c9a12d6f37a25921b7259ff1c4280
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/prometheus/prometheus/pull/5163/commits/ea254eea5e3c9a12d6f37a25921b7259ff1c4280
10
reference_url https://gitlab.com/gitlab-org/security-products/gemnasium-db/-/merge_requests/26608
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://gitlab.com/gitlab-org/security-products/gemnasium-db/-/merge_requests/26608
11
reference_url https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8%40%3Ccommits.zookeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8%40%3Ccommits.zookeeper.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177%40%3Ccommits.zookeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177%40%3Ccommits.zookeeper.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573%40%3Ccommits.zookeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573%40%3Ccommits.zookeeper.apache.org%3E
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3826
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-3826
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672865
reference_id 1672865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672865
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921615
reference_id 921615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921615
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prometheus:prometheus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:prometheus:prometheus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prometheus:prometheus:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
fixed_packages
0
url pkg:deb/debian/prometheus@2.7.1%2Bds-1?distro=trixie
purl pkg:deb/debian/prometheus@2.7.1%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.7.1%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/prometheus@2.24.1%2Bds-1?distro=trixie
purl pkg:deb/debian/prometheus@2.24.1%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.24.1%252Bds-1%3Fdistro=trixie
2
url pkg:deb/debian/prometheus@2.42.0%2Bds-5?distro=trixie
purl pkg:deb/debian/prometheus@2.42.0%2Bds-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.42.0%252Bds-5%3Fdistro=trixie
3
url pkg:deb/debian/prometheus@2.53.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/prometheus@2.53.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.53.3%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/prometheus@2.53.5%2Bds1-4?distro=trixie
purl pkg:deb/debian/prometheus@2.53.5%2Bds1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.53.5%252Bds1-4%3Fdistro=trixie
aliases CVE-2019-3826, GHSA-3m87-5598-2v4f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1s7q-drqn-4bhd
1
url VCID-ah98-bmyq-hue9
vulnerability_id VCID-ah98-bmyq-hue9
summary prometheus: open redirect under the /new endpoint
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29622.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29622
reference_id
reference_type
scores
0
value 0.86661
scoring_system epss
scoring_elements 0.99423
published_at 2026-04-21T12:55:00Z
1
value 0.86661
scoring_system epss
scoring_elements 0.99421
published_at 2026-04-12T12:55:00Z
2
value 0.86661
scoring_system epss
scoring_elements 0.99422
published_at 2026-04-13T12:55:00Z
3
value 0.86661
scoring_system epss
scoring_elements 0.99424
published_at 2026-04-18T12:55:00Z
4
value 0.87361
scoring_system epss
scoring_elements 0.99453
published_at 2026-04-11T12:55:00Z
5
value 0.89394
scoring_system epss
scoring_elements 0.99545
published_at 2026-04-08T12:55:00Z
6
value 0.89394
scoring_system epss
scoring_elements 0.99544
published_at 2026-04-09T12:55:00Z
7
value 0.91497
scoring_system epss
scoring_elements 0.99666
published_at 2026-04-04T12:55:00Z
8
value 0.91497
scoring_system epss
scoring_elements 0.99665
published_at 2026-04-01T12:55:00Z
9
value 0.91497
scoring_system epss
scoring_elements 0.99667
published_at 2026-04-07T12:55:00Z
10
value 0.91497
scoring_system epss
scoring_elements 0.99664
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29622
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1962718
reference_id 1962718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1962718
3
reference_url https://security.archlinux.org/ASA-202105-25
reference_id ASA-202105-25
reference_type
scores
url https://security.archlinux.org/ASA-202105-25
4
reference_url https://security.archlinux.org/AVG-1971
reference_id AVG-1971
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1971
5
reference_url https://access.redhat.com/errata/RHSA-2021:2438
reference_id RHSA-2021:2438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2438
fixed_packages
0
url pkg:deb/debian/prometheus@0?distro=trixie
purl pkg:deb/debian/prometheus@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@0%3Fdistro=trixie
1
url pkg:deb/debian/prometheus@2.24.1%2Bds-1?distro=trixie
purl pkg:deb/debian/prometheus@2.24.1%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.24.1%252Bds-1%3Fdistro=trixie
2
url pkg:deb/debian/prometheus@2.42.0%2Bds-5?distro=trixie
purl pkg:deb/debian/prometheus@2.42.0%2Bds-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.42.0%252Bds-5%3Fdistro=trixie
3
url pkg:deb/debian/prometheus@2.53.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/prometheus@2.53.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.53.3%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/prometheus@2.53.5%2Bds1-4?distro=trixie
purl pkg:deb/debian/prometheus@2.53.5%2Bds1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.53.5%252Bds1-4%3Fdistro=trixie
aliases CVE-2021-29622
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ah98-bmyq-hue9
2
url VCID-q9xc-6ugu-53cp
vulnerability_id VCID-q9xc-6ugu-53cp
summary
Prometheus has Stored XSS via metric names and label values in Prometheus web UI tooltips and metrics explorer
### Impact

Stored cross-site scripting (XSS) via crafted metric names in the Prometheus web UI:

* **Old React UI + New Mantine UI:** When a user hovers over a chart tooltip on the Graph page, metric names containing HTML/JavaScript are injected into `innerHTML` without escaping, causing arbitrary script execution in the user's browser.
* **Old React UI only:** When a user opens the Metric Explorer (globe icon next to the PromQL expression input field), and a metric name containing HTML/JavaScript is rendered in the fuzzy search results, it is injected into `innerHTML` without escaping, causing arbitrary script execution in the user's browser.
* **Old React UI only:** When a user views a heatmap chart and hovers over a cell, the `le` label values of the underlying histogram buckets are interpolated into `innerHTML` without escaping. While `le` is conventionally a numeric bucket boundary, Prometheus does not enforce this — arbitrary UTF-8 strings are accepted as label values, allowing script injection via a crafted scrape target or remote write.

With Prometheus v3.x defaulting to UTF-8 metric and label name validation, characters like `<`, `>`, and `"` are now valid in metric names and labels, making this exploitable.

An attacker who can inject metrics (via a compromised scrape target, remote write, or OTLP receiver endpoint) can execute JavaScript in the browser of any Prometheus user who views the metric in the Graph UI. From the XSS context, an attacker could for example:

- Read `/api/v1/status/config` to extract sensitive configuration (although credentials / secrets are redacted by the server)
- Call `/-/quit` to shut down Prometheus (only if `--web.enable-lifecycle` is set)
- Call `/api/v1/admin/tsdb/delete_series` to delete data (only if `--web.enable-admin-api` is set)
- Exfiltrate metric data to an external server

Both the new Mantine UI and the old React UI are affected. The vulnerable code paths are:

- `web/ui/mantine-ui/src/pages/query/uPlotChartHelpers.ts` — tooltip `innerHTML` with unescaped `labels.__name__`
- `web/ui/react-app/src/pages/graph/GraphHelpers.ts` — tooltip content with unescaped `labels.__name__`
- `web/ui/react-app/src/pages/graph/MetricsExplorer.tsx` — fuzzy search results rendered via `dangerouslySetInnerHTML` without sanitization
- `web/ui/react-app/src/vendor/flot/jquery.flot.heatmap.js` — heatmap tooltip with unescaped label values

### Patches

A patch has been published in Prometheus 3.5.2 LTS and Prometheus 3.11.2. The fix applies `escapeHTML()` to all user-controlled values (metric names and label values) before inserting them into `innerHTML`. This advisory will be updated with the patched version once released.

### Workarounds

- If using the remote write receiver (`--web.enable-remote-write-receiver`), ensure it is not exposed to untrusted sources.
- If using the OTLP receiver (`--web.enable-otlp-receiver`), ensure it is not exposed to untrusted sources.
- Ensure scrape targets are trusted and not under attacker control.
- Do not enable admin / mutating API endpoints (e.g. `--web.enable-admin-api` or `web.enable-lifecycle`) in cases where you cannot prevent untrusted data from being ingested.
- Users should avoid clicking untrusted links, especially those containing functions such as label_replace, as they may generate poisoned label names and values.

### Acknowledgements

Thanks to @gladiator9797 (Duc Anh Nguyen from TinyxLab) for reporting this.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-40179
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02744
published_at 2026-04-16T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02755
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05104
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-40179
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://github.com/prometheus/prometheus
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/prometheus/prometheus
3
reference_url https://github.com/prometheus/prometheus/commit/07c6232d159bfb474a077788be184d87adcfac3c
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:21:31Z/
url https://github.com/prometheus/prometheus/commit/07c6232d159bfb474a077788be184d87adcfac3c
4
reference_url https://github.com/prometheus/prometheus/pull/18506
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:21:31Z/
url https://github.com/prometheus/prometheus/pull/18506
5
reference_url https://github.com/prometheus/prometheus/security/advisories/GHSA-vffh-x6r8-xx99
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:21:31Z/
url https://github.com/prometheus/prometheus/security/advisories/GHSA-vffh-x6r8-xx99
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-40179
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-40179
fixed_packages
0
url pkg:deb/debian/prometheus@0?distro=trixie
purl pkg:deb/debian/prometheus@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@0%3Fdistro=trixie
1
url pkg:deb/debian/prometheus@2.24.1%2Bds-1?distro=trixie
purl pkg:deb/debian/prometheus@2.24.1%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.24.1%252Bds-1%3Fdistro=trixie
2
url pkg:deb/debian/prometheus@2.42.0%2Bds-5?distro=trixie
purl pkg:deb/debian/prometheus@2.42.0%2Bds-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.42.0%252Bds-5%3Fdistro=trixie
3
url pkg:deb/debian/prometheus@2.53.3%2Bds1-2?distro=trixie
purl pkg:deb/debian/prometheus@2.53.3%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.53.3%252Bds1-2%3Fdistro=trixie
4
url pkg:deb/debian/prometheus@2.53.5%2Bds1-4?distro=trixie
purl pkg:deb/debian/prometheus@2.53.5%2Bds1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.53.5%252Bds1-4%3Fdistro=trixie
aliases CVE-2026-40179, GHSA-vffh-x6r8-xx99
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q9xc-6ugu-53cp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/prometheus@2.42.0%252Bds-5%3Fdistro=trixie