PagerDuty Runbook through 2025-06-12 exposes stored secrets directly in the webpage DOM at the configuration page. Although these secrets appear masked as password fields, the actual secret values are present in the page source and can be revealed by simply modifying the input field type from "password" to "text" using browser developer tools. This vulnerability is exploitable by administrative users who have access to the configuration page.
References
| Link | Resource |
|---|---|
| https://github.com/carterross2/Vulnerability-Research/tree/main/CVE-2025-52493 | Third Party Advisory |
| https://www.pagerduty.com/platform/automation/ | Product |
| https://www.pagerduty.com/security/disclosure/ | Product |
| https://www.praetorian.com | Not Applicable |
Configurations
History
No history.
Information
Published : 2025-12-10 17:15
Updated : 2026-01-02 14:38
NVD link : CVE-2025-52493
Mitre link : CVE-2025-52493
CVE.ORG link : CVE-2025-52493
JSON object : View
Products Affected
pagerduty
- runbook_automation
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
