CVE-2026-32598

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.24, the password reset flow logs the complete password reset URL — containing the plaintext reset token — at INFO log level, which is enabled by default in production. Anyone with access to application logs (log aggregation, Docker logs, Kubernetes pod logs) can intercept reset tokens and perform account takeover on any user. This vulnerability is fixed in 10.0.24.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-13 19:55

Updated : 2026-03-17 20:06


NVD link : CVE-2026-32598

Mitre link : CVE-2026-32598

CVE.ORG link : CVE-2026-32598


JSON object : View

Products Affected

hackerbay

  • oneuptime
CWE
CWE-532

Insertion of Sensitive Information into Log File