Impact
Pyroscope can be configured to use Tencent Cloud Object Storage as a backend, and the configuration value for the secret_key that authorizes access to that storage is returned in plaintext through the API. If an attacker obtains the secret_key, the attacker can authenticate to the Tencent COS bucket, potentially reading, writing, or deleting data stored there, thereby compromising the confidentiality and integrity of the data in the cloud storage.
Affected Systems
Grafana:Pyroscope versions before 1.15.2, before 1.16.1, and before 1.17.0 are vulnerable. These versions include 1.15.x , 1.16.x , 1.17.x and earlier releases lacking the fix. Any deployment using those older versions with the Tencent COS backend must be considered affected.
Risk and Exploitability
The CVSS score is 9.1, indicating a critical severity. The EPSS score is not available, but the vulnerability is not listed in the CISA KEV catalog. An attacker needs direct access to the Pyroscope API, which typically requires the API to be reachable from an external or internal network. When such access exists, the attacker can exploit the exposed secret_key to compromise the underlying cloud object storage, leading to significant data exposure.
OpenCVE Enrichment
Github GHSA