Remote Code Execution Vulnerability in OneUptime by OneUptime
CVE-2026-30921

10CRITICAL

Key Information:

Vendor

Oneuptime

Status
Vendor
CVE Published:
9 March 2026

What is CVE-2026-30921?

OneUptime, a service monitoring solution, has a vulnerability that allows low-privileged project users to execute arbitrary Playwright code via its Synthetic Monitors feature. This occurs because the untrusted code is executed directly on the oneuptime-probe service within Node.js's virtual machine, leveraging live Playwright browser objects. Consequently, an attacker can exploit this vulnerability to launch arbitrary executables on the server or container. This critical flaw was addressed in version 10.0.20.

Affected Version(s)

oneuptime < 10.0.20

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.