CVE-2026-30957

OneUptime · OneUptime Synthetic Monitors

A server-side RCE vulnerability in OneUptime Synthetic Monitors allows low-privileged users to execute arbitrary commands by abusing exposed Playwright browser objects.

Executive summary

OneUptime is vulnerable to remote code execution because it exposes sensitive browser APIs to low-privileged users, allowing them to spawn malicious executables on the server.

Vulnerability

This vulnerability occurs because untrusted Synthetic Monitor code is executed while live host-realm Playwright browser and page objects remain exposed. A low-privileged authenticated project user can call Playwright APIs on these objects to cause the probe server to spawn an attacker-controlled executable, achieving server-side remote code execution without needing a sandbox escape.

Business impact

With a CVSS score of 9.9, this vulnerability allows for the total compromise of the oneuptime-probe server. An attacker can execute arbitrary commands, potentially leading to data exfiltration, service disruption, and lateral movement within the hosting environment. This poses a severe risk to the integrity of the monitoring platform.

Remediation

Immediate Action: Upgrade OneUptime to version 10.0.21 or later to properly isolate Playwright objects from the user execution environment.

Proactive Monitoring: Monitor for unexpected process creation (e.g., shells or unknown binaries) originating from the oneuptime-probe container.

Compensating Controls: Use container security tools to enforce strict syscall filtering and prevent the spawning of unauthorized sub-processes within the application environment.

Exploitation status

Public Exploit Available: No

Analyst recommendation

This vulnerability represents a critical failure in the isolation of user-provided code. It is imperative that administrators apply the update to version 10.0.21 immediately. Organizations should also review the permissions of users allowed to create synthetic monitors.