CVE-2026-30887

CRITICAL
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
PoC Detected
Mar 12, 2026 - 13:41 vuln.today
Public exploit code
CVE Published
Mar 10, 2026 - 17:40 nvd
CRITICAL 9.9

Description

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.18, OneUptime allows project members to run custom Playwright/JavaScript code via Synthetic Monitors to test websites. However, the system executes this untrusted user code inside the insecure Node.js vm module. By leveraging a standard prototype-chain escape (this.constructor.constructor), an attacker can bypass the sandbox, gain access to the underlying Node.js process object, and execute arbitrary system commands (RCE) on the oneuptime-probe container. Furthermore, because the probe holds database/cluster credentials in its environment variables, this directly leads to a complete cluster compromise. This vulnerability is fixed in 10.0.18.

Analysis

OneUptime monitoring platform prior to 10.0.18 allows code injection (CVSS 9.9) enabling RCE through the monitoring configuration.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Audit all OneUptime project members and revoke access for unnecessary accounts; document all Synthetic Monitor configurations currently in use. Within 7 days: Implement network segmentation to isolate OneUptime instances from critical systems; disable Synthetic Monitor custom code execution if operationally feasible; escalate with vendor for emergency patched release timeline. …

Sign in for detailed remediation steps.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +50
POC: +20

Share

CVE-2026-30887 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy