Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @oneuptime/common
  4. ›
  5. CVE-2026-30887

CVE-2026-30887: OneUpTime's Unsandboxed Code Execution in Probe Allows Any Project Member to Achieve RCE

March 7, 2026 (updated March 10, 2026)

OneUptime allows project members to run custom Playwright/JavaScript code via Synthetic Monitors to test websites. However, the system executes this untrusted user code inside the insecure Node.js vm module. By leveraging a standard prototype-chain escape (this.constructor.constructor), an attacker can bypass the sandbox, gain access to the underlying Node.js process object, and execute arbitrary system commands (RCE) on the oneuptime-probe container. Furthermore, because the probe holds database/cluster credentials in its environment variables, this directly leads to a complete cluster compromise.

References

  • github.com/OneUptime/oneuptime
  • github.com/OneUptime/oneuptime/security/advisories/GHSA-h343-gg57-2q67
  • github.com/advisories/GHSA-h343-gg57-2q67
  • nvd.nist.gov/vuln/detail/CVE-2026-30887

Code Behaviors & Features

Detect and mitigate CVE-2026-30887 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.0.18

Fixed versions

  • 10.0.18

Solution

Upgrade to version 10.0.18 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

npm/@oneuptime/common/CVE-2026-30887.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 19 Mar 2026 16:06:41 +0000.