OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, multiple notification API endpoints are registered without authentication middleware, while sibling endpoints in the same codebase correctly use ClusterKeyAuthorization.isAuthorizedServiceMiddleware. These endpoints are externally reachable via the Nginx proxy at /notification/. Combined with a projectId leak from the public Status Page API, an unauthenticated attacker can purchase phone numbers on the victim's Twilio account and delete all existing alerting numbers. This issue has been patched in version 10.0.42.
References
| Link | Resource |
|---|---|
| https://github.com/OneUptime/oneuptime/commit/9adbd04538714740506708d6fa610e433be4d2a4 | Patch |
| https://github.com/OneUptime/oneuptime/releases/tag/10.0.42 | Product Release Notes |
| https://github.com/OneUptime/oneuptime/security/advisories/GHSA-6wc5-rhvj-cx7f | Exploit Mitigation Vendor Advisory |
Configurations
History
13 Apr 2026, 18:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Hackerbay oneuptime
Hackerbay |
|
| References | () https://github.com/OneUptime/oneuptime/commit/9adbd04538714740506708d6fa610e433be4d2a4 - Patch | |
| References | () https://github.com/OneUptime/oneuptime/releases/tag/10.0.42 - Product, Release Notes | |
| References | () https://github.com/OneUptime/oneuptime/security/advisories/GHSA-6wc5-rhvj-cx7f - Exploit, Mitigation, Vendor Advisory | |
| CPE | cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
02 Apr 2026, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 19:21
Updated : 2026-04-13 18:45
NVD link : CVE-2026-34759
Mitre link : CVE-2026-34759
CVE.ORG link : CVE-2026-34759
JSON object : View
Products Affected
hackerbay
- oneuptime
CWE
CWE-862
Missing Authorization
