top of page
perceptive_background_267k.jpg

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.35, a low-privileged authenticated user (ProjectMember) can achieve rem…

Published:

25 maart 2026 om 23:00:00

Alert date:

26 maart 2026 om 16:11:28

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Security Tools

OneUptime monitoring platform contains a remote command execution vulnerability in versions prior to 10.0.35. Low-privileged authenticated users can exploit the Synthetic Monitor Playwright script execution feature to achieve RCE on Probe containers. The vulnerability stems from an incomplete sandbox denylist that fails to block _browserType and launchServer properties, allowing attackers to traverse page.context().browser()._browserType.launchServer() and spawn arbitrary processes. The issue has been patched in version 10.0.35.

Technical details

Mitigation steps:

Affected products:

OneUptime

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page