Description
OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, OneUptime's SAML SSO implementation (App/FeatureSet/Identity/Utils/SSO.ts) has decoupled signature verification and identity extraction. isSignatureValid() verifies the first <Signature> element in the XML DOM using xml-crypto, while getEmail() always reads from assertion[0] via xml2js. An attacker can prepend an unsigned assertion containing an arbitrary identity before a legitimately signed assertion, resulting in authentication bypass. This issue has been patched in version 10.0.42.
Published: 2026-04-02
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

OneUptime’s SAML SSO implementation separates the verification of XML signatures from the extraction of identity data. The signature validation routine checks only the first <Signature> element, while the code that retrieves the user’s email always reads the first assertion in the document. An attacker can exploit this mismatch by placing an unsigned SAML assertion containing a forged identity before a properly signed assertion. The system then accepts the forged identity because the signature check is satisfied by the later assertion, allowing the attacker to authenticate as any user without being detected. This flaw falls under the CWE-347 category of untrusted resource usage and results in an authentication bypass with the potential to gain unauthorized access to the application. The vulnerability is included in all versions before OneUptime 10.0.42.

Affected Systems

The affected product is OneUptime, an open‑source monitoring and observability platform. All releases prior to version 10.0.42 are vulnerable; the issue was fixed in the 10.0.42 release. System administrators should verify that the application is running a patched version or otherwise mitigate the SSO configuration.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity vulnerability. No EPSS score is available, and the flaw is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, leveraging the SAML SSO authorization flow that can be triggered over the network. An attacker who can inject a crafted SAML response into the authentication request can execute the bypass with minimal prerequisites, making the exploit relatively straightforward in environments where the SSO integration is exposed externally. Because the flaw permits elevation of privileges to any authenticated user, the impact on confidentiality, integrity, and availability is substantial, potentially allowing full control of the target system.

Generated by OpenCVE AI on April 2, 2026 at 22:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading OneUptime to version 10.0.42 or later. If an upgrade is not immediately possible, disable or remove the SAML SSO integration from the application configuration to block the attack surface.

Generated by OpenCVE AI on April 2, 2026 at 22:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Oneuptime
Oneuptime oneuptime
Vendors & Products Oneuptime
Oneuptime oneuptime

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, OneUptime's SAML SSO implementation (App/FeatureSet/Identity/Utils/SSO.ts) has decoupled signature verification and identity extraction. isSignatureValid() verifies the first <Signature> element in the XML DOM using xml-crypto, while getEmail() always reads from assertion[0] via xml2js. An attacker can prepend an unsigned assertion containing an arbitrary identity before a legitimately signed assertion, resulting in authentication bypass. This issue has been patched in version 10.0.42.
Title OneUptime SSO: Multi-Assertion Identity Injection via Decoupled Signature Verification
Weaknesses CWE-347
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Oneuptime Oneuptime
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T20:20:13.291Z

Reserved: 2026-03-30T20:52:53.284Z

Link: CVE-2026-34840

cve-icon Vulnrichment

Updated: 2026-04-02T20:20:08.122Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-02T20:16:28.357

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-34840

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:16:33Z

Weaknesses