Description
Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS).

If the database is configured to use Tencent COS as the storage backend, an attacker could extract the secret_key configuration value from the Pyroscope API.

To exploit this vulnerability, an attacker needs direct access to the Pyroscope API. We highly recommend limiting the public internet exposure of all our databases, such that they are only accessible by trusted users or internal systems.

This vulnerability is fixed in versions:

1.15.x: 1.15.2 and above.
1.16.x: 1.16.1 and above.
1.17.x: 1.17.0 and above (i.e. all versions).

Thanks to Théo Cusnir for reporting this vulnerability to us via our bug bounty program.
Published: 2026-04-15
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Data Exposure
Action: Apply Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m9hq-h476-h2g8 Pyroscope Exposes Storage Secret
History

Mon, 20 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:grafana:pyroscope:*:*:*:*:*:*:*:*
cpe:2.3:a:grafana:pyroscope:1.16.0:*:*:*:*:*:*:*

Mon, 20 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-732

Sat, 18 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200

Sat, 18 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-201
References
Metrics threat_severity

None

threat_severity

Important


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Grafana
Grafana pyroscope
Vendors & Products Grafana
Grafana pyroscope

Wed, 15 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS). If the database is configured to use Tencent COS as the storage backend, an attacker could extract the secret_key configuration value from the Pyroscope API. To exploit this vulnerability, an attacker needs direct access to the Pyroscope API. We highly recommend limiting the public internet exposure of all our databases, such that they are only accessible by trusted users or internal systems. This vulnerability is fixed in versions: 1.15.x: 1.15.2 and above. 1.16.x: 1.16.1 and above. 1.17.x: 1.17.0 and above (i.e. all versions). Thanks to Théo Cusnir for reporting this vulnerability to us via our bug bounty program.
Title Sensitive COS `SecretKey` exposed in plaintext via configuration API due to missing type protection
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Grafana Pyroscope
cve-icon MITRE

Status: PUBLISHED

Assigner: GRAFANA

Published:

Updated: 2026-05-13T19:28:46.050Z

Reserved: 2025-04-16T09:19:26.443Z

Link: CVE-2025-41118

cve-icon Vulnrichment

Updated: 2026-04-15T19:32:59.983Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-15T20:16:32.933

Modified: 2026-04-20T20:10:46.013

Link: CVE-2025-41118

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-15T19:15:17Z

Links: CVE-2025-41118 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:00:12Z

Weaknesses