CVE-2026-32308

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown viewer component renders Mermaid diagrams with securityLevel: "loose" and injects the SVG output via innerHTML. This configuration explicitly allows interactive event bindings in Mermaid diagrams, enabling XSS through Mermaid's click directive which can execute arbitrary JavaScript. Any field that renders markdown (incident descriptions, status page announcements, monitor notes) is vulnerable. This vulnerability is fixed in 10.0.23.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:*

History

17 Mar 2026, 20:08

Type Values Removed Values Added
First Time Hackerbay oneuptime
Hackerbay
CPE cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:*
References () https://github.com/OneUptime/oneuptime/security/advisories/GHSA-wvh5-6vjm-23qh - () https://github.com/OneUptime/oneuptime/security/advisories/GHSA-wvh5-6vjm-23qh - Exploit, Mitigation, Vendor Advisory

13 Mar 2026, 19:54

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-13 19:54

Updated : 2026-03-17 20:08


NVD link : CVE-2026-32308

Mitre link : CVE-2026-32308

CVE.ORG link : CVE-2026-32308


JSON object : View

Products Affected

hackerbay

  • oneuptime
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')