CVE-2026-30887

OneUptime · OneUptime Synthetic Monitors

OneUptime Synthetic Monitors are vulnerable to a sandbox escape via the Node.js vm module, allowing authenticated users to achieve remote code execution and full cluster compromise.

Executive summary

Authenticated users in OneUptime can escape the JavaScript sandbox to execute arbitrary system commands, leading to a complete compromise of the database and cluster credentials.

Vulnerability

The system executes custom Playwright/JavaScript code within an insecure Node.js vm module. An authenticated project member can leverage a standard prototype-chain escape to bypass this sandbox, gain access to the underlying Node.js process object, and execute arbitrary system commands (RCE) on the oneuptime-probe container.

Business impact

The business impact is critical, as the affected container holds environment variables containing database and cluster credentials. Exploitation leads directly to a complete cluster compromise. With a CVSS score of 9.9, the risk involves total loss of data confidentiality, integrity, and availability across the entire monitoring infrastructure.

Remediation

Immediate Action: Update OneUptime to version 10.0.18 or later to ensure untrusted code is executed in a secure, hardened environment.

Proactive Monitoring: Inspect synthetic monitor configurations for suspicious JavaScript or use of constructor escapes and review container logs for unauthorized shell activity.

Compensating Controls: Implement network segmentation to isolate the oneuptime-probe containers and restrict their access to sensitive internal databases and cluster APIs.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the potential for complete cluster takeover, this vulnerability must be addressed with extreme urgency. Organizations should upgrade to version 10.0.18 immediately. Until the patch is applied, restrict the ability of users to create or modify synthetic monitors.