CRITICALCVE-2026-27574CVSS 9.9

OneUptime:: node:vm sandbox escape in probe allows any project member to achieve RCE

प्लेटफ़ॉर्म

nodejs

घटक

@oneuptime/common

में ठीक किया गया

10.0.6

10.0.0

AI Confidence: highNVDEPSS 0.0%समीक्षित: मई 2026
आपकी भाषा में अनुवाद हो रहा है…

CVE-2026-27574 is a critical Remote Code Execution (RCE) vulnerability discovered in the @oneuptime/common package, a component used for creating custom monitors within the OneUptime platform. This vulnerability allows attackers who can register an account to execute arbitrary code on the underlying server, potentially leading to full cluster compromise. The vulnerability affects versions prior to 10.0.0, and a fix has been released in version 10.0.0.

प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…

The impact of CVE-2026-27574 is severe. The vulnerability stems from the way OneUptime allows users to define custom JavaScript monitors. These monitors are executed within Node.js using the vm module, which is explicitly documented by Node.js as unsuitable for running untrusted code. An attacker who can register an account can inject malicious JavaScript code into a monitor. This code then executes with the privileges of the OneUptime probe process, which has host networking access and holds all cluster credentials in its environment. This effectively grants the attacker complete control over the cluster, enabling them to steal sensitive data, modify configurations, and potentially pivot to other systems within the network. The attack pattern mirrors scenarios where untrusted code execution within a containerized environment leads to complete container breakout and host compromise.

शोषण संदर्भअनुवाद हो रहा है…

CVE-2026-27574 was publicly disclosed on February 24, 2026. The vulnerability's severity is high due to the ease of exploitation and the potential for complete cluster compromise. There are currently no known public exploits or active campaigns targeting this vulnerability, but the availability of the underlying vm module exploitation technique makes it a likely target. The vulnerability has been added to the CISA KEV catalog, indicating a heightened risk of exploitation. Public proof-of-concept code is expected to emerge shortly.

कौन जोखिम में हैअनुवाद हो रहा है…

Organizations using OneUptime with custom JavaScript monitors are at risk. This includes teams relying on OneUptime for application performance monitoring and those who have granted project members the ability to create and manage custom monitors. Shared hosting environments where multiple users share the same OneUptime instance are particularly vulnerable, as a compromised account could impact all users on the host.

पहचान के चरणअनुवाद हो रहा है…

• nodejs / server:

ps aux | grep 'node -e' | grep '@oneuptime/common'

• nodejs / server:

journalctl -u oneuptime -g 'VMRunner.t'

• generic web: Use curl to check for exposed monitor endpoints and attempt to inject simple JavaScript payloads to test for RCE.

curl 'http://<oneuptime_server>/monitor/execute?script=<malicious_javascript>'

हमले की समयरेखा

  1. Disclosure

    disclosure

  2. Patch

    patch

खतरा खुफिया

एक्सप्लॉइट स्थिति

प्रूफ ऑफ कॉन्सेप्टअज्ञात
CISA KEVNO
इंटरनेट एक्सपोज़रउच्च
रिपोर्ट4 खतरा रिपोर्ट

EPSS

0.02% (6% शतमक)

CISA SSVC

शोषणpoc
स्वचालनीयno
तकनीकी प्रभावtotal

CVSS वेक्टर

खतरा इंटेलिजेंस· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H9.9CRITICALAttack VectorNetworkहमलावर लक्ष्य तक कैसे पहुंचता हैAttack ComplexityLowशोषण के लिए आवश्यक शर्तेंPrivileges RequiredLowहमले के लिए प्रमाणीकरण स्तरUser InteractionNoneक्या पीड़ित को कार्रवाई करनी होगीScopeChangedघटक से परे प्रभावConfidentialityHighसंवेदनशील डेटा उजागर होने का जोखिमIntegrityHighअनधिकृत डेटा संशोधन का जोखिमAvailabilityHighसेवा बाधा का जोखिमnextguardhq.com · CVSS v3.1 आधार स्कोर
इन मेट्रिक्स का क्या मतलब है?
Attack Vector
नेटवर्क — इंटरनेट के माध्यम से दूरस्थ रूप से शोषण योग्य। कोई भौतिक या स्थानीय पहुंच आवश्यक नहीं।
Attack Complexity
निम्न — कोई विशेष शर्त नहीं। विश्वसनीय रूप से शोषण योग्य।
Privileges Required
निम्न — कोई भी वैध उपयोगकर्ता खाता पर्याप्त है।
User Interaction
कोई नहीं — स्वचालित और मूक हमला। पीड़ित कुछ नहीं करता।
Scope
बदला हुआ — हमला कमज़ोर घटक से परे अन्य प्रणालियों तक फैल सकता है।
Confidentiality
उच्च — पूर्ण गोपनीयता हानि। हमलावर सभी डेटा पढ़ सकता है।
Integrity
उच्च — हमलावर कोई भी डेटा लिख, बदल या हटा सकता है।
Availability
उच्च — पूर्ण क्रैश या संसाधन समाप्ति। पूर्ण सेवा से इनकार।

प्रभावित सॉफ्टवेयर

घटक@oneuptime/common
विक्रेताosv
प्रभावित श्रेणीमें ठीक किया गया
< 10.0.5 – < 10.0.510.0.6
10.0.0

कमजोरी वर्गीकरण (CWE)

समयरेखा

  1. आरक्षित
  2. प्रकाशित
  3. EPSS अद्यतन

शमन और वर्कअराउंडअनुवाद हो रहा है…

The primary mitigation for CVE-2026-27574 is to immediately upgrade to version 10.0.0 or later of the @oneuptime/common package. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing stricter input validation and sanitization for any user-supplied JavaScript code used in monitors. While not a complete solution, this can reduce the attack surface. Review existing monitors for any suspicious or unusual code. Consider implementing a Web Application Firewall (WAF) with rules to detect and block malicious JavaScript payloads targeting the monitor execution endpoint. Monitor system logs for unusual process activity or unexpected network connections originating from the OneUptime probe process. After upgrading, confirm the fix by attempting to execute a known malicious payload within a monitor and verifying that it is blocked or fails to execute.

कैसे ठीक करें

OneUptime को संस्करण 10.0.5 या उच्चतर में अपडेट करें। यह संस्करण कस्टम जावास्क्रिप्ट मॉनिटरिंग फ़ंक्शन में सैंडबॉक्स एस्केप भेद्यता को ठीक करता है।

CVE सुरक्षा न्यूज़लेटर

भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।

अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…

What is CVE-2026-27574 — Remote Code Execution in @oneuptime/common?

CVE-2026-27574 is a critical RCE vulnerability in the @oneuptime/common package, allowing attackers to execute arbitrary code via custom JavaScript monitors, potentially leading to full cluster compromise.

Am I affected by CVE-2026-27574 in @oneuptime/common?

You are affected if you are using @oneuptime/common versions prior to 10.0.0 and have enabled custom JavaScript monitors.

How do I fix CVE-2026-27574 in @oneuptime/common?

Upgrade to version 10.0.0 or later of the @oneuptime/common package. Implement stricter input validation for user-supplied JavaScript code as a temporary workaround.

Is CVE-2026-27574 being actively exploited?

While no active exploitation has been confirmed, the vulnerability's severity and ease of exploitation make it a likely target.

Where can I find the official @oneuptime/common advisory for CVE-2026-27574?

Refer to the OneUptime official advisory and release notes for detailed information and updates: [https://oneuptime.io/](https://oneuptime.io/)

क्या आपका प्रोजेक्ट प्रभावित है?

अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।