top of page
perceptive_background_267k.jpg

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.18, OneUptime allows project members to run custom Playwright/JavaScript code…

Published:

9 March 2026 at 23:00:00

Alert date:

10 March 2026 at 18:06:15

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

OneUptime monitoring solution contains a critical vulnerability in versions prior to 10.0.18 that allows remote code execution through sandbox escape. The vulnerability exists in the Synthetic Monitors feature which executes untrusted JavaScript code in an insecure Node.js vm module. Attackers can exploit prototype-chain escape techniques to bypass the sandbox and execute arbitrary system commands. The vulnerability leads to complete cluster compromise as the probe container contains database and cluster credentials in environment variables. This represents a critical security flaw affecting monitoring infrastructure with severe impact potential.

Technical details

Mitigation steps:

Affected products:

OneUptime

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page