PagerDuty Runbook through 2025-06-12 exposes stored secrets directly in the webpage DOM at the configuration page. Although these secrets appear masked as password fields, the actual secret values are present in the page source and can be revealed by simply modifying the input field type from "password" to "text" using browser developer tools. This vulnerability is exploitable by administrative users who have access to the configuration page.
References
Configurations
No configuration.
History
11 Dec 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-200 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
10 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 17:15
Updated : 2025-12-12 15:18
NVD link : CVE-2025-52493
Mitre link : CVE-2025-52493
CVE.ORG link : CVE-2025-52493
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
