CVE-2026-29779: UptimeFlare
CVE-2026-29779
Attackers can steal API keys and internal paths via CVE-2026-29779 in UptimeFlare on Cloudflare Workers. Update to commit 377a596 to fix this data leak.
Vendor-confirmed - CVE-2026-29779 is a high information disclosure in UptimeFlare, a Cloudflare Worker-based monitoring solution, that leaks sensitive server configuration data-including API keys and internal paths-to every website visitor. Update immediately to commit 377a596 and rotate all secrets.
Overview
A significant information disclosure vulnerability, identified as CVE-2026-29779, has been discovered in UptimeFlare, a serverless monitoring solution built on Cloudflare Workers. This flaw could allow unauthorized parties to access sensitive configuration data intended only for server-side execution.
Vulnerability Explained
In simple terms, UptimeFlare’s code was structured in a way that accidentally bundled sensitive server configuration data with the public, client-side web page code. Specifically, a file meant for internal server use (workerConfig), containing potentially sensitive operational details, was incorrectly imported and processed by code that runs in a visitor’s web browser. This caused the confidential workerConfig object to be included in the JavaScript files downloaded by every website visitor, exposing any secrets or internal paths it contained.
Potential Impact
The primary risk is the exposure of sensitive configuration details. Depending on what was stored in the workerConfig object, this could include:
- Internal API keys or tokens for integrated services.
- Database connection strings or internal network paths.
- Other environment-specific secrets used by the Worker backend. Attackers could leverage this exposed information to further compromise the monitoring system, attack connected backend services, or gain unauthorized access to related infrastructure. For context on how exposed data can be exploited, recent incidents are detailed in our breach reports.
Remediation and Mitigation
This issue has been addressed by the maintainers. Immediate action is required for all users.
Action Required:
- Update Immediately: Ensure your UptimeFlare deployment uses code from commit
377a596or later. This patch properly separates client and server configuration, preventing the sensitive data from being bundled for client delivery. - Rotate Secrets: As a precaution, proactively rotate any API keys, tokens, or credentials that may have been defined within the
workerConfigobject, even if you see no evidence of misuse. Treat them as potentially compromised. - Verify Deployment: After updating, audit your publicly served JavaScript bundles to confirm that sensitive
workerConfigproperties are no longer present.
Users should regularly update their dependencies and review their deployment build processes to prevent similar client-side leakage of server secrets. For the latest updates on such vulnerabilities, follow our security news section.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Age...
Exposure of sensitive information to an unauthorized actor in Azure DevOps allows an unauthorized attacker to disclose information over a network....
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. From versions 3.2.0 to before 3.2.11 and 3.3.0 to before 3.3.9, there is a missing authorization and data-masking gap in Argo ...
Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network....