CVE-2025-52493

PagerDuty Runbook through 2025-06-12 exposes stored secrets directly in the webpage DOM at the configuration page. Although these secrets appear masked as password fields, the actual secret values are present in the page source and can be revealed by simply modifying the input field type from "password" to "text" using browser developer tools. This vulnerability is exploitable by administrative users who have access to the configuration page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pagerduty:runbook_automation:*:*:*:*:*:*:*:*

History

02 Jan 2026, 14:38

Type Values Removed Values Added
References () https://github.com/carterross2/Vulnerability-Research/tree/main/CVE-2025-52493 - () https://github.com/carterross2/Vulnerability-Research/tree/main/CVE-2025-52493 - Third Party Advisory
References () https://www.pagerduty.com/platform/automation/ - () https://www.pagerduty.com/platform/automation/ - Product
References () https://www.pagerduty.com/security/disclosure/ - () https://www.pagerduty.com/security/disclosure/ - Product
References () https://www.praetorian.com - () https://www.praetorian.com - Not Applicable
CPE cpe:2.3:a:pagerduty:runbook_automation:*:*:*:*:*:*:*:*
First Time Pagerduty runbook Automation
Pagerduty

11 Dec 2025, 16:16

Type Values Removed Values Added
CWE CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

10 Dec 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-10 17:15

Updated : 2026-01-02 14:38


NVD link : CVE-2025-52493

Mitre link : CVE-2025-52493

CVE.ORG link : CVE-2025-52493


JSON object : View

Products Affected

pagerduty

  • runbook_automation
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor