CVE-2026-30887: OneUptime
CVE-2026-30887
CVE-2026-30887 (CVSS 9.9) lets authenticated project members escape Node.js vm sandbox in OneUptime <10.0.18, gaining full RCE on the monitoring server and cluster. Upgrade to 10.0.18 now.
Patch now - CVE-2026-30887 is a critical sandbox escape in OneUptime versions prior to 10.0.18 that grants authenticated project members full Remote Code Execution (RCE) on the underlying server, leading to complete cluster compromise. Upgrade to version 10.0.18 immediately.
Overview
A critical security vulnerability, tracked as CVE-2026-30887, has been discovered in the OneUptime monitoring platform. This flaw allows authenticated project members to execute arbitrary system commands on the underlying server, leading to a full compromise of the monitoring system and potentially the entire backend cluster.
Vulnerability Details
OneUptime versions prior to 10.0.18 include a feature called Synthetic Monitors, which lets users run custom JavaScript code to test websites. This code was executed inside a sandbox created by Node.js’s vm module, which is not designed for security isolation. An attacker with project member access can craft malicious code that escapes this sandbox using a known JavaScript technique (this.constructor.constructor). Once escaped, the attacker gains direct access to the Node.js process running in the oneuptime-probe container, enabling full Remote Code Execution (RCE).
Impact and Risks
The severity of this vulnerability is critical (CVSS: 9.9). Successful exploitation leads to:
- Complete Container Compromise: Attackers can run any command on the
oneuptime-probecontainer. - Cluster-Wide Breach: Since the probe container stores sensitive database and cluster credentials in its environment variables, an attacker can steal these to compromise the entire backend infrastructure.
- Data Theft and Service Disruption: This access can be used to exfiltrate all monitored service data, alter monitoring configurations, or disrupt operations. For context on how such breaches unfold, recent incidents are detailed in our breach reports.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Fix:
- Upgrade Immediately: All users must upgrade their OneUptime installation to version 10.0.18 or later, which contains the patch for this vulnerability. No workarounds are available.
Additional Security Measures:
- Review Access Controls: Audit and minimize the number of users with project member permissions to use Synthetic Monitors.
- Monitor for Anomalies: Check system and container logs for any suspicious command execution or unauthorized access attempts, especially around the
oneuptime-probeservice. - Isolate Credentials: As a general best practice, consider reviewing how sensitive credentials are stored and accessed by application containers to limit the blast radius of any future vulnerabilities.
Staying informed about such critical updates is crucial for maintaining security. For the latest on vulnerabilities and patches, follow our security news.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-30887?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a secur...
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fr...
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function ...
Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to version 2.11.1, it is possible to escape the security boundraries set by `@enclave-vm/core`, which can be use...
Other Java Vulnerabilities
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fr...
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function ...
In DeviceId of DeviceId.java, there is a possible desync in persistence due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. ...
NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verific...