PagerDuty Runbook through 2025-06-12 exposes stored secrets directly in the webpage DOM at the configuration page. Although these secrets appear masked as password fields, the actual secret values are present in the page source and can be revealed by simply modifying the input field type from "password" to "text" using browser developer tools. This vulnerability is exploitable by administrative users who have access to the configuration page.
History

Thu, 11 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Pagerduty
Pagerduty runbook
Vendors & Products Pagerduty
Pagerduty runbook

Wed, 10 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Description PagerDuty Runbook through 2025-06-12 exposes stored secrets directly in the webpage DOM at the configuration page. Although these secrets appear masked as password fields, the actual secret values are present in the page source and can be revealed by simply modifying the input field type from "password" to "text" using browser developer tools. This vulnerability is exploitable by administrative users who have access to the configuration page.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-10T00:00:00.000Z

Updated: 2025-12-11T16:07:44.875Z

Reserved: 2025-06-17T00:00:00.000Z

Link: CVE-2025-52493

cve-icon Vulnrichment

Updated: 2025-12-11T16:07:13.489Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T17:15:53.693

Modified: 2025-12-12T15:18:42.140

Link: CVE-2025-52493

cve-icon Redhat

No data.