Description
The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information of MySQL/PostgreSQL.

This issue affects Apache SkyWalking: from 9.7.0 through 10.3.0.

Users are recommended to upgrade to version 10.4.0, which fixes the issue.
Published: 2026-04-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive configuration information disclosure
Action: Patch
AI Analysis

Impact

The Apache SkyWalking OAP /debugging/config/dump endpoint can expose sensitive database configuration details, including MySQL or PostgreSQL credentials, to an attacker. When accessed, the response contains configuration values that could be used to compromise the underlying database. The CWE indicates a privacy compromise due to inadequate data handling. The likely attack vector is limited to users who can reach the open endpoint and may require local or remote access if authentication or firewall controls are lax. Based on the description, it is inferred that unauthenticated or low‑privileged users could consume this data.

Affected Systems

Apache SkyWalking versions 9.7.0 through 10.3.0 are affected. The vendor release 10.4.0 contains the fix and is the recommended version for all deployments.

Risk and Exploitability

The CVSS score is 7.5, and the EPSS score is less than 1%, indicating that while the vulnerability poses a moderate-to-high severity risk, its exploitation likelihood is currently low. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. While the endpoint can leak confidential data, an attacker must first reach the endpoint; the lack of public exploitation evidence suggests a moderate risk, yet any exposure of database credentials is severe for confidentiality. The highest rating comes from the potential for total loss of database integrity if those credentials could be used to modify or delete data.

Generated by OpenCVE AI on April 17, 2026 at 06:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache SkyWalking to version 10.4.0 to apply the vendor fix.
  • Disable the /debugging/config/dump endpoint or restrict its exposure behind authentication or network controls.
  • Monitor logs for attempts to access the debugging endpoint and implement an alerting rule for repeated or unusual access attempts.

Generated by OpenCVE AI on April 17, 2026 at 06:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-27h3-crw2-q36w SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information
History

Mon, 20 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:skywalking:*:*:*:*:*:*:*:*

Thu, 16 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
References

Wed, 15 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache skywalking
Vendors & Products Apache
Apache skywalking

Wed, 15 Apr 2026 11:00:00 +0000

Type Values Removed Values Added
Description The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information of MySQL/PostgreSQL. This issue affects Apache SkyWalking: from 9.7.0 through 10.3.0. Users are recommended to upgrade to version 10.4.0, which fixes the issue.
Title Apache SkyWalking: The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information of MySQL/PostgreSQL.
Weaknesses CWE-202
References

Subscriptions

Apache Skywalking
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-16T12:05:25.254Z

Reserved: 2026-03-05T01:06:13.446Z

Link: CVE-2026-30778

cve-icon Vulnrichment

Updated: 2026-04-15T11:25:13.874Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-15T11:16:33.603

Modified: 2026-04-20T16:46:52.490

Link: CVE-2026-30778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T07:00:08Z

Weaknesses