top of page
perceptive_background_267k.jpg

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit…

Published:

9 maart 2026 om 23:00:00

Alert date:

10 maart 2026 om 18:06:15

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

OneUptime monitoring solution contains a critical remote code execution vulnerability in versions prior to 10.0.20. Low-privileged users can submit custom Playwright code that executes on the oneuptime-probe service. The vulnerability allows attackers to bypass sandbox restrictions by directly accessing Playwright browser objects to spawn arbitrary executables on the host container. This creates a server-side RCE primitive without requiring traditional sandbox escape techniques. The issue is resolved in version 10.0.20.

Technical details

Mitigation steps:

Affected products:

OneUptime

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page