OneUptime Auth Bypass (CVE-2026-34758)
CVE-2026-34758
OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/Wha...
Overview
A critical security flaw in the OneUptime monitoring platform allows unauthenticated attackers to abuse its notification systems and purchase phone numbers. Tracked as CVE-2026-34758, this vulnerability affects all versions prior to 10.0.42.
Vulnerability Details
OneUptime is an open-source platform for monitoring website uptime and application performance. The vulnerability resides in specific API endpoints designed for testing notifications and managing phone numbers. These endpoints failed to verify user authentication, allowing anyone with network access to the OneUptime server to interact with them directly.
The flaw is highly severe due to its low attack complexity and the complete lack of required privileges or user interaction. An attacker can send requests to these endpoints without needing a valid user account.
Impact and Risks
The impact of this vulnerability is significant and multi-faceted. An unauthenticated attacker can:
- Abuse Communication Channels: Send unlimited test SMS messages, phone calls, emails, and WhatsApp messages. This can lead to spam, phishing campaigns, denial-of-service against the integrated communication services, and substantial financial costs for the organization operating the OneUptime instance.
- Purchase Phone Numbers: Exploit the phone number management functionality to purchase new phone numbers, directly incurring charges and potentially using these numbers for fraudulent activities.
- Operational Disruption: Degrade the integrity of the monitoring platform by flooding its logs and interfering with legitimate alerting functions.
This flaw represents a direct path to financial loss and reputational damage for affected organizations. For more on the consequences of such incidents, recent data breach reports are available at breach reports.
Remediation and Mitigation
The primary and only complete mitigation is to update the OneUptime software immediately.
- Patch Immediately: Upgrade your OneUptime installation to version 10.0.42 or later. This version contains the necessary patches to enforce authentication on the affected endpoints.
- No Workarounds: Given the nature of the flaw, there are no effective configuration-based workarounds. Patching is mandatory.
- Verification: After upgrading, administrators should verify that the notification test and phone management features are no longer accessible from unauthenticated sessions.
Stay informed on the latest vulnerability disclosures and patches by following security news.
Security Insight
This incident highlights the critical risk of “internal” administrative or testing endpoints being inadvertently exposed to the public internet without proper access controls. It mirrors a common pattern in web application security where features built for convenience during development or testing are not adequately locked down before production deployment, turning them into a primary attack surface.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbitrary file upload vulnerability in the template import functionality. The issue exists in /website_code/php/import/import...
OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a privilege escalation and authentication bypass vulnerability in OpenSTAManager allo...
Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr deb...
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote ses...