Impact
The vulnerability is in OneUptime’s password reset flow prior to version 10.0.24. The application logs the full password reset URL, including the reset token in plaintext, at the default INFO log level. This is a CWE‑532 weakness where sensitive data is written to logs. As a result, anyone who can read the application logs can capture a valid reset token and subsequently perform an account takeover for any user of the system.
Affected Systems
Affected products are OneUptime – the open‑source monitoring platform – with all releases before 10.0.24. The vulnerability exists in the password reset implementation under the product name oneuptime. No specific sub‑version ranges are listed beyond the note that the fix is in 10.0.24, so all prior releases are considered impacted.
Risk and Exploitability
The CVSS score is 6.9, indicating a moderate severity. The EPSS score is below 1 %, suggesting a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires access to the application logs, which may be available via Docker logs, Kubernetes pod logs, or a log aggregation system. If log access is restricted to privileged users, the risk is mitigated; otherwise an attacker who can read logs could acquire a reset token and impersonate any user. The likely attack vector is based on log access rather than a typical remote exposure.
OpenCVE Enrichment
Github GHSA