Description
OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.35, a low-privileged authenticated user (ProjectMember) can achieve remote command execution on the Probe container/host by abusing Synthetic Monitor Playwright script execution. Synthetic monitor code is executed in VMRunner.runCodeInNodeVM with a live Playwright page object in context. The sandbox relies on a denylist of blocked properties/methods, but it is incomplete. Specifically, _browserType and launchServer are not blocked, so attacker code can traverse `page.context().browser()._browserType.launchServer(...)` and spawn arbitrary processes. Version 10.0.35 contains a patch.
Published: 2026-03-26
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a sandbox escape in the Synthetic Monitor Playwright runtime of OneUptime. A low‑privileged authenticated user with a ProjectMember role can run arbitrary JavaScript that accesses unblocked Playwright APIs to spawn processes on the Probe container or host. The flaw is due to an incomplete deny‑list, allowing code such as page.context().browser()._browserType.launchServer(...). This enables full control of the probe environment and results in remote command execution.

Affected Systems

Vulnerable installations are running OneUptime versions prior to 10.0.35. Any deployment that has the synthetic monitor feature enabled can be affected. The affected product is OneUptime OneUptime.

Risk and Exploitability

With a CVSS score of 10, the vulnerability is considered critical. The attacker must be authenticated as a ProjectMember, a role that can create or modify synthetic monitors. Once a malicious script is executed, the attacker can run arbitrary commands on the Probe or host. EPSS data is unavailable, so the likelihood of exploitation cannot be quantified. The vulnerability is not yet listed in the CISA KEV catalog.

Generated by OpenCVE AI on March 26, 2026 at 22:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OneUptime to version 10.0.35 or later.
  • If an upgrade cannot be performed immediately, disable all Synthetic Monitor Playwright scripts to prevent exploitation.
  • Reduce or remove the ability of ProjectMember role users to create or edit synthetic monitors until the patch is applied.

Generated by OpenCVE AI on March 26, 2026 at 22:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Oneuptime
Oneuptime oneuptime
Vendors & Products Oneuptime
Oneuptime oneuptime

Thu, 26 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Hackerbay
Hackerbay oneuptime
CPEs cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:*
Vendors & Products Hackerbay
Hackerbay oneuptime

Thu, 26 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.35, a low-privileged authenticated user (ProjectMember) can achieve remote command execution on the Probe container/host by abusing Synthetic Monitor Playwright script execution. Synthetic monitor code is executed in VMRunner.runCodeInNodeVM with a live Playwright page object in context. The sandbox relies on a denylist of blocked properties/methods, but it is incomplete. Specifically, _browserType and launchServer are not blocked, so attacker code can traverse `page.context().browser()._browserType.launchServer(...)` and spawn arbitrary processes. Version 10.0.35 contains a patch.
Title OneUptime has sandbox escape in Synthetic Monitor Playwright runtime allows project members to execute arbitrary commands on Probe
Weaknesses CWE-184
CWE-693
CWE-78
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Hackerbay Oneuptime
Oneuptime Oneuptime
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T13:56:13.442Z

Reserved: 2026-03-19T17:02:34.169Z

Link: CVE-2026-33396

cve-icon Vulnrichment

Updated: 2026-03-26T13:56:02.789Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T14:16:13.310

Modified: 2026-03-26T20:40:52.840

Link: CVE-2026-33396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:26:42Z

Weaknesses