Description
Uptime Kuma is an open source, self-hosted monitoring tool. From 2.0.0 to 2.1.3 , the GET /api/badge/:id/ping/:duration? endpoint in server/routers/api-router.js does not verify that the requested monitor belongs to a public group. All other badge endpoints check AND public = 1 in their SQL query before returning data. The ping endpoint skips this check entirely, allowing unauthenticated users to extract average ping/response time data for private monitors. This vulnerability is fixed in 2.2.0.
Published: 2026-03-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

From version 2.0.0 to 2.1.3, the GET /api/badge/:id/ping/:duration? endpoint in Uptime Kuma’s server/routers/api-router.js does not enforce that the requested monitor belongs to a public group. While other badge endpoints correctly authenticate the monitor’s visibility in the database query, the ping endpoint omits this check entirely, enabling unauthenticated users to retrieve average ping and response time data for private monitors. This broken access control (CWE-862) allows an attacker to obtain sensitive monitoring metrics without authorization, potentially revealing performance characteristics or uptime information that could aid further attacks.

Affected Systems

The vulnerability affects the uptime-kuma product from the louislam vendor. All releases from version 2.0.0 up to and including 2.1.3 are impacted. The fix was introduced in release 2.2.0, so any deployment running a version prior to 2.2.0 is susceptible.

Risk and Exploitability

The CVSS v3.1 base score is 5.3, indicating moderate severity. The EPSS score is less than 1%, suggesting a low probability of exploitation in the wild, and the vulnerability has not been catalogued in the CISA KEV list. The attack requires only an unauthenticated HTTP GET request to the endpoint, which any internet‑exposed instance of Uptime Kuma can process. Because the data exposed are internal monitoring metrics, the potential damage is limited to information disclosure, but could assist attackers in planning subsequent attacks. Pilots of the vulnerability have not been widely documented, so the likelihood remains low, but the impact of any leaks warrants mitigation.

Generated by OpenCVE AI on March 19, 2026 at 22:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading Uptime Kuma to version 2.2.0 or later.

Generated by OpenCVE AI on March 19, 2026 at 22:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c7hf-c5p5-5g6h Uptime Kuma is Missing Authorization Checks on Ping Badge Endpoint, Leaks Ping times of monitors without needing to be on a status page
History

Thu, 19 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Uptime.kuma
Uptime.kuma uptime Kuma
CPEs cpe:2.3:a:uptime.kuma:uptime_kuma:*:*:*:*:*:*:*:*
Vendors & Products Uptime.kuma
Uptime.kuma uptime Kuma

Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Louislam
Louislam uptime-kuma
Vendors & Products Louislam
Louislam uptime-kuma

Thu, 12 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Uptime Kuma is an open source, self-hosted monitoring tool. From 2.0.0 to 2.1.3 , the GET /api/badge/:id/ping/:duration? endpoint in server/routers/api-router.js does not verify that the requested monitor belongs to a public group. All other badge endpoints check AND public = 1 in their SQL query before returning data. The ping endpoint skips this check entirely, allowing unauthenticated users to extract average ping/response time data for private monitors. This vulnerability is fixed in 2.2.0.
Title Uptime Kuma is Missing Authorization Checks on Ping Badge Endpoint, Leaks Ping times of monitors without needing to be on a status page
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Louislam Uptime-kuma
Uptime.kuma Uptime Kuma
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:19:12.948Z

Reserved: 2026-03-11T14:47:05.681Z

Link: CVE-2026-32230

cve-icon Vulnrichment

Updated: 2026-03-13T16:18:58.440Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T19:16:16.820

Modified: 2026-03-19T21:06:13.853

Link: CVE-2026-32230

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:48:36Z

Weaknesses