PagerDuty Runbook through 2025-06-12 exposes stored secrets directly in the webpage DOM at the configuration page. Although these secrets appear masked as password fields, the actual secret values are present in the page source and can be revealed by simply modifying the input field type from "password" to "text" using browser developer tools. This vulnerability is exploitable by administrative users who have access to the configuration page.
References
| Link | Resource |
|---|---|
| https://github.com/carterross2/Vulnerability-Research/tree/main/CVE-2025-52493 | Third Party Advisory |
| https://www.pagerduty.com/platform/automation/ | Product |
| https://www.pagerduty.com/security/disclosure/ | Product |
| https://www.praetorian.com | Not Applicable |
Configurations
History
02 Jan 2026, 14:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/carterross2/Vulnerability-Research/tree/main/CVE-2025-52493 - Third Party Advisory | |
| References | () https://www.pagerduty.com/platform/automation/ - Product | |
| References | () https://www.pagerduty.com/security/disclosure/ - Product | |
| References | () https://www.praetorian.com - Not Applicable | |
| CPE | cpe:2.3:a:pagerduty:runbook_automation:*:*:*:*:*:*:*:* | |
| First Time |
Pagerduty runbook Automation
Pagerduty |
11 Dec 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-200 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
10 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 17:15
Updated : 2026-01-02 14:38
NVD link : CVE-2025-52493
Mitre link : CVE-2025-52493
CVE.ORG link : CVE-2025-52493
JSON object : View
Products Affected
pagerduty
- runbook_automation
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
