CVE-2026-33396

OneUptime · OneUptime

OneUptime versions prior to 10.0.35 allow low-privileged users to achieve remote code execution on the Probe container by escaping the Playwright sandbox via unblocked internal properties.

Executive summary

A critical sandbox escape in OneUptime allows authenticated, low-privileged users to execute arbitrary commands on the underlying host or container by abusing the Synthetic Monitor feature.

Vulnerability

The vulnerability involves an incomplete denylist in the VMRunner.runCodeInNodeVM sandbox. A low-privileged authenticated user (ProjectMember) can use a live Playwright page object to traverse to _browserType.launchServer, allowing them to spawn arbitrary processes outside the intended sandbox.

Business impact

This vulnerability facilitates lateral movement and full container compromise from a low-privileged account. With a CVSS score of 9.9, the impact is severe, potentially leading to the theft of monitoring data, credential harvesting from the host, and disruption of observability services.

Remediation

Immediate Action: Update OneUptime to version 10.0.35 or higher to apply the corrected sandbox restrictions.

Proactive Monitoring: Audit Synthetic Monitor scripts for any use of internal Playwright properties or attempts to access the browser() or context() methods in ways that deviate from standard monitoring.

Compensating Controls: Implement strict container escape protections, such as AppArmor or SELinux profiles, and ensure the Probe containers run with the least possible privileges on the host.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability for a low-privileged user to execute code on the infrastructure represents a significant insider threat and lateral movement risk. Application of the 10.0.35 patch is critical to restoring the integrity of the script execution sandbox.