OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown viewer component renders Mermaid diagrams with securityLevel: "loose" and injects the SVG output via innerHTML. This configuration explicitly allows interactive event bindings in Mermaid diagrams, enabling XSS through Mermaid's click directive which can execute arbitrary JavaScript. Any field that renders markdown (incident descriptions, status page announcements, monitor notes) is vulnerable. This vulnerability is fixed in 10.0.23.
References
| Link | Resource |
|---|---|
| https://github.com/OneUptime/oneuptime/security/advisories/GHSA-wvh5-6vjm-23qh | Exploit Mitigation Vendor Advisory |
Configurations
History
17 Mar 2026, 20:08
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Hackerbay oneuptime
Hackerbay |
|
| CPE | cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:* | |
| References | () https://github.com/OneUptime/oneuptime/security/advisories/GHSA-wvh5-6vjm-23qh - Exploit, Mitigation, Vendor Advisory |
13 Mar 2026, 19:54
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:54
Updated : 2026-03-17 20:08
NVD link : CVE-2026-32308
Mitre link : CVE-2026-32308
CVE.ORG link : CVE-2026-32308
JSON object : View
Products Affected
hackerbay
- oneuptime
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
