๐Ÿ” CVE Alert

CVE-2026-40179

UNKNOWN 0.0

Prometheus: Stored XSS via metric names and label values in web UI tooltips and metrics explorer

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
3th

Prometheus is an open-source monitoring system and time series database. Versions 3.0 through 3.5.1 and 3.6.0 through 3.11.1 have stored cross-site scripting vulnerabilities in multiple components of the Prometheus web UI where metric names and label values are injected into innerHTML without escaping. In both the Mantine UI and old React UI, chart tooltips on the Graph page render metric names containing HTML/JavaScript without sanitization. In the old React UI, the Metric Explorer fuzzy search results use dangerouslySetInnerHTML without escaping, and heatmap cell tooltips interpolate le label values without sanitization. With Prometheus v3.x defaulting to UTF-8 metric and label name validation, characters like <, >, and " are now valid in metric names and labels. An attacker who can inject metrics via a compromised scrape target, remote write, or OTLP receiver endpoint can execute arbitrary JavaScript in the browser of any Prometheus user who views the metric in the Graph UI, potentially enabling configuration exfiltration, data deletion, or Prometheus shutdown depending on enabled flags. This issue has been fixed in versions 3.5.2 and 3.11.2. If developers are unable to immediately update, the following workarounds are recommended: ensure that the remote write receiver (--web.enable-remote-write-receiver) and the OTLP receiver (--web.enable-otlp-receiver) are not exposed to untrusted sources; verify that all scrape targets are trusted and not under attacker control; avoid enabling admin or mutating API endpoints (e.g., --web.enable-admin-api or --web.enable-lifecycle) in environments where untrusted data may be ingested; and refrain from clicking untrusted links, particularly those containing functions such as label_replace, as they may generate poisoned label names and values.

CWE CWE-79
Vendor prometheus
Product prometheus
Ecosystems
Industries
Technology
Published Apr 15, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for prometheus prometheus

Be the first to know when new unknown vulnerabilities affecting prometheus prometheus are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

prometheus / prometheus
>= 3.0.0, < 3.5.2 >= 3.6.0, < 3.11.2 < 0.311.2-0.20260410083055-07c6232d159b

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/prometheus/prometheus/security/advisories/GHSA-vffh-x6r8-xx99 github.com: https://github.com/prometheus/prometheus/pull/18506 github.com: https://github.com/prometheus/prometheus/commit/07c6232d159bfb474a077788be184d87adcfac3c