


Perceptive Security
SOC/SIEM Consultancy

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.35, a low-privileged authenticated user (ProjectMember) can achieve rem…
Published:
25 maart 2026 om 23:00:00
Alert date:
26 maart 2026 om 16:11:28
Source:
nvd.nist.gov
Web Technologies, Security Tools
OneUptime monitoring platform contains a remote command execution vulnerability in versions prior to 10.0.35. Low-privileged authenticated users can exploit the Synthetic Monitor Playwright script execution feature to achieve RCE on Probe containers. The vulnerability stems from an incomplete sandbox denylist that fails to block _browserType and launchServer properties, allowing attackers to traverse page.context().browser()._browserType.launchServer() and spawn arbitrary processes. The issue has been patched in version 10.0.35.
Technical details
Mitigation steps:
Affected products:
OneUptime
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33396
https://github.com/OneUptime/oneuptime/commit/e8e4ee3ff0740eb131045ab3d67453141c46178a
https://github.com/OneUptime/oneuptime/security/advisories/GHSA-cqpg-phpp-9jjg
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
