Remote Code Execution Vulnerability in OneUptime by OneUptime
CVE-2026-30957

10CRITICAL

Key Information:

Vendor

Oneuptime

Status
Vendor
CVE Published:
10 March 2026

What is CVE-2026-30957?

OneUptime, a monitoring solution, has a vulnerability that allows low-privileged authenticated project users to execute arbitrary commands on the oneuptime-probe server. This arises from the execution of untrusted code within Node's virtual machine, exposing live Playwright browser and page objects. A malicious user can exploit this by calling Playwright APIs on the compromised browser object, leading to the deployment of attacker-controlled executables. This issue affects versions prior to 10.0.21 and has been addressed in the latest release.

Affected Version(s)

oneuptime < 10.0.21

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.