OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal in the /workflow/docs/:componentName endpoint allows reading arbitrary files from the server filesystem. The componentName route parameter is concatenated directly into a file path passed to res.sendFile() in orker/FeatureSet/Workflow/Index.ts with no sanitization or authentication middleware. This vulnerability is fixed in 10.0.21.
References
| Link | Resource |
|---|---|
| https://github.com/OneUptime/oneuptime/releases/tag/10.0.21 | Product Release Notes |
| https://github.com/OneUptime/oneuptime/security/advisories/GHSA-p2wh-9pw8-hvff | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-10 18:18
Updated : 2026-03-12 14:09
NVD link : CVE-2026-30958
Mitre link : CVE-2026-30958
CVE.ORG link : CVE-2026-30958
JSON object : View
Products Affected
hackerbay
- oneuptime
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
