Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-30887 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OneUptime < 10.0.18 allows executing untrusted code in Node.js `vm` module. πŸ“‰ **Consequences**: Sandbox escape, Remote Code Execution (RCE), and total cluster compromise.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-94 (Code Injection). πŸ› **Flaw**: Unsafe execution of user-supplied code within the Node.js `vm` module. The sandbox is effectively broken, allowing code to break out. ⚠️

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: OneUptime. πŸ“¦ **Product**: OneUptime (Open Source Monitoring Solution). πŸ“… **Affected**: Versions **before 10.0.18**. βœ… **Fixed**: Version 10.0.18 and later.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Full system access. πŸ“‚ **Data**: Complete cluster takeover. πŸ–₯️ **Action**: Hackers can execute arbitrary commands remotely. 🚫 No restrictions on what they can do once inside.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Auth Required**: Yes. βš–οΈ **Level**: Low Privileges (PR:L). 🌐 **Access**: Network (AV:N). 🚢 **UI**: None required (UI:N). πŸ“ **Complexity**: Low (AC:L). Easy to exploit if you have basic login access.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: No PoC provided in data. πŸ•΅οΈ **Status**: Advisory confirmed via GitHub (GHSA-h343-gg57-2q67). 🚫 **Wild Exploit**: Unknown, but severity suggests high risk if weaponized.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Verify your OneUptime version. πŸ“Š **Scan**: Look for Node.js `vm` module usage in custom scripts. πŸ› οΈ **Feature**: Check if users can inject code into monitoring scripts.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ”„ **Patch**: Upgrade to **OneUptime 10.0.18** or newer. πŸ“’ **Source**: Official GitHub Security Advisory. πŸ›‘οΈ Immediate update recommended.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable user script execution features. 🚫 **Mitigation**: Restrict access to the `vm` module. πŸ›‘ **Isolate**: Segment the cluster to limit lateral movement.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. 🚨 **Priority**: P1. πŸ“’ **Action**: Patch immediately. πŸ“‰ **Impact**: High (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). πŸ›‘οΈ Do not delay.