Impact
The vulnerability resides in the WhatsApp webhook handler of OneUptime. Incoming POST requests to /notification/whatsapp/webhook are processed without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature. An attacker can forge payloads that change notification delivery status records, suppress alerts, and corrupt audit trails, compromising the integrity of the monitoring system.
Affected Systems
All OneUptime installations running versions before 10.0.34 are affected. The product is an open-source platform for monitoring and managing online services. The bug is limited to the WhatsApp webhook endpoint.
Risk and Exploitability
With a CVSS base score of 8.7, the flaw is classified as high severity. EPSS indicates a less than 1 % probability of exploitation, and the issue is not listed in the CISA KEV catalog. Exploitation requires only unauthenticated access to the exposed webhook URL over HTTP or HTTPS; no special credentials are needed. An attacker can modify status fields in the database, potentially erasing evidence of incidents and delaying detection of service problems.
OpenCVE Enrichment
Github GHSA