Skip to main content

CVE-2026-42154

CVE Details

Visit the official vulnerability details page for CVE-2026-42154 to learn more.

Initial Publication

05/04/2026

Last Update

05/04/2026

Third Party Dependency

github.com/prometheus/prometheus

NIST CVE Summary

Prometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 and 3.11.3, the remote read endpoint (/api/v1/read) does not validate the declared decoded length in a snappy-compressed request body before allocating memory. An unauthenticated attacker can send a small payload that causes a huge heap allocation per request. Under concurrent load this can exhaust available memory and crash the Prometheus process. This issue has been patched in versions 3.5.3 and 3.11.3.

CVE Severity

7.5

Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.

Status

Received

Affected Products & Versions

VersionPaletteAIPaletteAI VerteX
1.0.7⚠️ Impacted⚠️ Impacted

Revision History

No revisions available.