CVE-2026-29779: UptimeFlare
CVE-2026-29779
UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for clie...
Overview
A significant information disclosure vulnerability, identified as CVE-2026-29779, has been discovered in UptimeFlare, a serverless monitoring solution built on Cloudflare Workers. This flaw could allow unauthorized parties to access sensitive configuration data intended only for server-side execution.
Vulnerability Explained
In simple terms, UptimeFlare’s code was structured in a way that accidentally bundled sensitive server configuration data with the public, client-side web page code. Specifically, a file meant for internal server use (workerConfig), containing potentially sensitive operational details, was incorrectly imported and processed by code that runs in a visitor’s web browser. This caused the confidential workerConfig object to be included in the JavaScript files downloaded by every website visitor, exposing any secrets or internal paths it contained.
Potential Impact
The primary risk is the exposure of sensitive configuration details. Depending on what was stored in the workerConfig object, this could include:
- Internal API keys or tokens for integrated services.
- Database connection strings or internal network paths.
- Other environment-specific secrets used by the Worker backend. Attackers could leverage this exposed information to further compromise the monitoring system, attack connected backend services, or gain unauthorized access to related infrastructure. For context on how exposed data can be exploited, recent incidents are detailed in our breach reports.
Remediation and Mitigation
This issue has been addressed by the maintainers. Immediate action is required for all users.
Action Required:
- Update Immediately: Ensure your UptimeFlare deployment uses code from commit
377a596or later. This patch properly separates client and server configuration, preventing the sensitive data from being bundled for client delivery. - Rotate Secrets: As a precaution, proactively rotate any API keys, tokens, or credentials that may have been defined within the
workerConfigobject, even if you see no evidence of misuse. Treat them as potentially compromised. - Verify Deployment: After updating, audit your publicly served JavaScript bundles to confirm that sensitive
workerConfigproperties are no longer present.
Users should regularly update their dependencies and review their deployment build processes to prevent similar client-side leakage of server secrets. For the latest updates on such vulnerabilities, follow our security news section.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Age...
EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns...
Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerability exists in Known 1.6.2 and earlier. The application leaks the password reset token within a hidden ...
Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to th...