CVE-2026-30957

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root cause is that untrusted Synthetic Monitor code is executed inside Node's vm while live host-realm Playwright browser and page objects are exposed to it. A malicious user can call Playwright APIs on the injected browser object and cause the probe to spawn an attacker-controlled executable. This is a server-side remote code execution issue. It does not require a separate vm sandbox escape. This vulnerability is fixed in 10.0.21.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:*

History

12 Mar 2026, 14:11

Type Values Removed Values Added
First Time Hackerbay oneuptime
Hackerbay
CPE cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:*
References () https://github.com/OneUptime/oneuptime/releases/tag/10.0.21 - () https://github.com/OneUptime/oneuptime/releases/tag/10.0.21 - Product, Release Notes
References () https://github.com/OneUptime/oneuptime/security/advisories/GHSA-jw8q-gjvg-8w4q - () https://github.com/OneUptime/oneuptime/security/advisories/GHSA-jw8q-gjvg-8w4q - Exploit, Vendor Advisory

11 Mar 2026, 13:53

Type Values Removed Values Added
Summary
  • (es) OneUptime es una solución para monitorear y gestionar servicios en línea. Antes de la versión 10.0.21, los Monitores Sintéticos de OneUptime permiten a un usuario de proyecto autenticado con bajos privilegios ejecutar comandos arbitrarios en el servidor/contenedor oneuptime-probe. La causa raíz es que el código no confiable del Monitor Sintético se ejecuta dentro de la vm de Node mientras que objetos de navegador y página de Playwright del reino del host en vivo están expuestos a él. Un usuario malicioso puede llamar a las API de Playwright en el objeto de navegador inyectado y hacer que la sonda genere un ejecutable controlado por el atacante. Este es un problema de ejecución remota de código de lado del servidor. No requiere un escape de sandbox de vm separado. Esta vulnerabilidad está corregida en la versión 10.0.21.

10 Mar 2026, 18:18

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-10 18:18

Updated : 2026-03-12 14:11


NVD link : CVE-2026-30957

Mitre link : CVE-2026-30957

CVE.ORG link : CVE-2026-30957


JSON object : View

Products Affected

hackerbay

  • oneuptime
CWE
CWE-749

Exposed Dangerous Method or Function