WebAuthn Authentication Flaw in OneUptime Affects User Security
CVE-2026-28787
What is CVE-2026-28787?
OneUptime, a service for monitoring and managing online applications, has a significant vulnerability in its WebAuthn authentication mechanism found in version 10.0.11 and earlier. The flaw stems from the improper handling of the challenge parameter, which is sent to the client rather than being securely stored on the server. This design oversight contradicts the specifications set forth by the WebAuthn W3C standard. Consequently, if an attacker gains access to a legitimate WebAuthn assertion—potentially through Cross-Site Scripting (XSS), Man-in-the-Middle (MitM) attacks, or log exposure—they can replay this assertion repeatedly, effectively circumventing the intended second-factor authentication process. This raises serious concerns about user security, and as of now, no patches are available to mitigate this issue.
Affected Version(s)
oneuptime <= 10.0.11
