CVE-2026-40179
Published:April 15, 2026
Updated:April 23, 2026
Prometheus is an open-source monitoring system and time series database. Versions 3.0 through 3.5.1 and 3.6.0 through 3.11.1 have stored cross-site scripting vulnerabilities in multiple components of the Prometheus web UI where metric names and label values are injected into innerHTML without escaping. In both the Mantine UI and old React UI, chart tooltips on the Graph page render metric names containing HTML/JavaScript without sanitization. In the old React UI, the Metric Explorer fuzzy search results use dangerouslySetInnerHTML without escaping, and heatmap cell tooltips interpolate le label values without sanitization. With Prometheus v3.x defaulting to UTF-8 metric and label name validation, characters like <, >, and " are now valid in metric names and labels. An attacker who can inject metrics via a compromised scrape target, remote write, or OTLP receiver endpoint can execute arbitrary JavaScript in the browser of any Prometheus user who views the metric in the Graph UI, potentially enabling configuration exfiltration, data deletion, or Prometheus shutdown depending on enabled flags. This issue has been fixed in versions 3.5.2 and 3.11.2. If developers are unable to immediately update, the following workarounds are recommended: ensure that the remote write receiver (--web.enable-remote-write-receiver) and the OTLP receiver (--web.enable-otlp-receiver) are not exposed to untrusted sources; verify that all scrape targets are trusted and not under attacker control; avoid enabling admin or mutating API endpoints (e.g., --web.enable-admin-api or --web.enable-lifecycle) in environments where untrusted data may be ingested; and refrain from clicking untrusted links, particularly those containing functions such as label_replace, as they may generate poisoned label names and values.
Affected Packages
https://github.com/prometheus/prometheus.git (GITHUB):
Affected version(s) >=v3.11.0 <v3.11.2Fix Suggestion:
Update to version v3.11.2https://github.com/prometheus/prometheus.git (GITHUB):
Affected version(s) >=v0.311.0 <v0.311.2Fix Suggestion:
Update to version v0.311.2https://github.com/prometheus/prometheus.git (GITHUB):
Affected version(s) >=v3.5.0 <v3.5.2Fix Suggestion:
Update to version v3.5.2https://github.com/prometheus/prometheus.git (GITHUB):
Affected version(s) >=v0.35.0-rc1 <v0.305.2Fix Suggestion:
Update to version v0.305.2github.com/prometheus/prometheus (GO):
Affected version(s) >=v0.306.0 <v0.311.2Fix Suggestion:
Update to version v0.311.2github.com/prometheus/prometheus (GO):
Affected version(s) >=v0.300.0 <v0.305.2Fix Suggestion:
Update to version v0.305.2Related ResourcesĀ (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
LOW
Subsequent System Integrity
LOW
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
EPSS
Base Score:
0.01