<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Pyroscope — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/pyroscope/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/pyroscope/feed.xml" rel="self" type="application/rss+xml"/><item><title>Pyroscope Secret Key Exposure via Tencent COS Configuration (CVE-2025-41118)</title><link>https://feed.craftedsignal.io/briefs/2026-04-pyroscope-secret-key-leak/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pyroscope-secret-key-leak/</guid><description>CVE-2025-41118 allows an attacker with direct access to the Pyroscope API, when configured with Tencent COS, to extract the secret_key configuration value, potentially leading to unauthorized access to the cloud storage backend.</description><content:encoded><![CDATA[<p>Pyroscope is an open-source continuous profiling database that supports various storage backends, including Tencent Cloud Object Storage (COS). A vulnerability, identified as CVE-2025-41118, exists where an attacker with direct access to the Pyroscope API can extract the <code>secret_key</code> configuration value when Tencent COS is used as the storage backend. This vulnerability poses a significant risk as the exposed secret key could allow unauthorized access to the Tencent COS storage, potentially leading to data breaches or other malicious activities. The vulnerability has been patched in versions 1.15.2 and above, 1.16.1 and above, and all versions of 1.17.x. It is strongly recommended to limit public internet exposure of Pyroscope API instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the Pyroscope API endpoint, either through public exposure or internal network penetration.</li>
<li>Attacker sends a crafted HTTP request to the Pyroscope API endpoint designed to expose configuration details. The specific API endpoint and parameters are not detailed in the source but are assumed to exist for configuration management.</li>
<li>The vulnerable Pyroscope API processes the request without proper authorization or input validation.</li>
<li>The API retrieves the Tencent COS storage configuration, including the <code>secret_key</code>.</li>
<li>The <code>secret_key</code> is inadvertently included in the API response to the attacker.</li>
<li>Attacker extracts the <code>secret_key</code> from the API response.</li>
<li>Attacker uses the compromised <code>secret_key</code> to authenticate to Tencent COS.</li>
<li>Attacker gains unauthorized access to data stored in the Tencent COS bucket associated with the compromised <code>secret_key</code>, potentially leading to data exfiltration, modification, or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-41118 grants an attacker unauthorized access to the Tencent COS storage backend used by Pyroscope. This access allows the attacker to read, modify, or delete data stored in the cloud storage. The impact depends on the sensitivity of the data stored in Tencent COS. In a worst-case scenario, a complete data breach and service disruption are possible. The number of affected Pyroscope installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Pyroscope instances to the patched versions: 1.15.2+, 1.16.1+, or any 1.17.x version to remediate CVE-2025-41118.</li>
<li>Implement network access controls to restrict access to the Pyroscope API to trusted users or internal systems, mitigating initial access, as suggested in the overview.</li>
<li>Deploy the Sigma rule <code>Detect Pyroscope Configuration Request</code> to identify potential attempts to access sensitive configuration data via the API.</li>
<li>Regularly review and audit the configuration of Pyroscope and its storage backends (Tencent COS) to ensure proper security measures are in place.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>pyroscope</category><category>tencent-cos</category><category>secret-key-exposure</category><category>cve-2025-41118</category><category>cloud</category></item></channel></rss>