Impact
The vulnerability originates from a client‑controlled is‑multi‑tenant‑query header that, when forged together with a projectid header, causes the server to skip internal permission checks in BasePermission. This authorization bypass allows a low‑privileged user to read data from other tenants, expose sensitive user information such as resetPasswordToken, and reset victim passwords, leading to full account takeover. The weakness is classified by CWE‑285 and CWE‑862.
Affected Systems
Affected deployments are those running OneUptime version 10.0.20 or earlier. The vulnerability was fixed in release 10.0.21. All installations of OneUptime that have not applied the latest patch remain vulnerable.
Risk and Exploitability
Risk is severe with a CVSS score of 10 and an EPSS of <1 %. The CVE enables a low‑privileged user to forge the is‑multi‑tenant‑query and projectid headers, bypassing permission checks and allowing read access to other tenants’ data, exposure of sensitive user fields, and full account takeover. No public exploits have been reported, and the vulnerability is not listed in the KEV catalog.
OpenCVE Enrichment
Github GHSA