Skip to content

ui: fix stored XSS in old UI heatmap chart tick labels#18588

Merged
roidelapluie merged 1 commit intoprometheus:release-3.11from
roidelapluie:roidelapluie/react-escape
Apr 27, 2026
Merged

ui: fix stored XSS in old UI heatmap chart tick labels#18588
roidelapluie merged 1 commit intoprometheus:release-3.11from
roidelapluie:roidelapluie/react-escape

Conversation

@roidelapluie
Copy link
Copy Markdown
Member

This fixes the stored XSS as described in:

GHSA-fw8g-cg8f-9j28

Which issue(s) does the PR fix:

Release notes for end users (ALL commits must be considered).

Reviewers should verify clarity and quality.

[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels.

This fixes the stored XSS as described in:

GHSA-fw8g-cg8f-9j28

Signed-off-by: Julius Volz <julius.volz@gmail.com>
Signed-off-by: Julien Pivotto <291750+roidelapluie@users.noreply.github.com>
@roidelapluie roidelapluie requested review from a team and juliusv as code owners April 27, 2026 10:30
@roidelapluie roidelapluie changed the base branch from main to release-3.11 April 27, 2026 10:54
Copy link
Copy Markdown
Member

@krajorama krajorama left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

stamp

@roidelapluie roidelapluie enabled auto-merge April 27, 2026 11:19
@roidelapluie roidelapluie merged commit ecbde5f into prometheus:release-3.11 Apr 27, 2026
59 of 60 checks passed
eleboucher pushed a commit to eleboucher/homelab that referenced this pull request Apr 28, 2026
… v3.11.3) (#303)

This PR contains the following updates:

| Package | Update | Change |
|---|---|---|
| [quay.io/prometheus/prometheus](https://github.com/prometheus/prometheus) | patch | `v3.11.2` → `v3.11.3` |

---

### Release Notes

<details>
<summary>prometheus/prometheus (quay.io/prometheus/prometheus)</summary>

### [`v3.11.3`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3): 3.11.3 / 2026-04-27

[Compare Source](prometheus/prometheus@v3.11.2...v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@&#8203;iiihaiii](https://github.com/iiihaiii) and [@&#8203;Ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#&#8203;18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#&#8203;18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#&#8203;18588](prometheus/prometheus#18588)

</details>

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update again.

---

 - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box

---

This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate).
<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My4xMDEuMSIsInVwZGF0ZWRJblZlciI6IjQzLjEwMS4xIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJyZW5vdmF0ZS9jb250YWluZXIiLCJ0eXBlL3BhdGNoIl19-->

Reviewed-on: https://git.erwanleboucher.dev/eleboucher/homelab/pulls/303
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 1, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 2, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)
renovate Bot added a commit to sdwilsh/ansible-playbooks that referenced this pull request May 2, 2026
##### [\`v3.11.3\`](https://github.com/prometheus/prometheus/releases/tag/v3.11.3)

This release fixes mutiple security issues.

We would like to thank the following people for the responsible disclosures:

- Shadowbyte (4c1dr3aper) - Charlie Lewis for the Remote-Read snappy decode vulnerability.

- Brett Gervasoni for the AzureAD OAuth `client_secret` vulnerability.

- [@iiihaiii](https://github.com/iiihaiii) and [@ngocnn97](https://github.com/Ngocnn97) for the Old UI XSS vulnerability.

- \[SECURITY] AzureAD remote write: Fix OAuth `client_secret` being exposed in plaintext via `/-/config` endpoint. GHSA-wg65-39gg-5wfj / CVE-2026-42151 [#18590](prometheus/prometheus#18590)

- \[SECURITY] Remote-read: Reject snappy-compressed requests whose declared decoded length exceeds the decode limit. GHSA-8rm2-7qqf-34qm / CVE-2026-42154 [#18584](prometheus/prometheus#18584)

- \[SECURITY] UI: Fix stored XSS via unescaped `le` label values in old UI heatmap chart tick labels. GHSA-fw8g-cg8f-9j28 [#18588](prometheus/prometheus#18588)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants