Critical Command Injection Flaw in OneUptime Exposes Systems to Remote Takeover
A severe command injection vulnerability, tracked as CVE-2026-27728, has been discovered in OneUptime, a platform used for monitoring and managing online services. The flaw allows authenticated users to execute arbitrary operating system commands on the Probe server, risking full system compromise.
The vulnerability resides in the NetworkPathMonitor.performTraceroute() function within OneUptime’s Probe Server component. The function processes user-controlled input specifically the destination field in monitor configurations using Node.js’s exec() function, which spawns shell commands. Due to improper input sanitization, attackers can inject malicious commands via shell metacharacters (e.g., ;, |, &, $(), or backticks), bypassing intended traceroute operations.
Exploitation requires only low-level authentication as a project user. By crafting a malicious monitor configuration (e.g., example.com; cat /etc/passwd), an attacker can execute arbitrary commands with the same privileges as the Probe server process. Successful exploitation could lead to data exfiltration, lateral movement, or complete server takeover.
OneUptime addressed the issue in version 10.0.7, replacing the vulnerable exec() function with execFile(), which executes commands directly without shell interpretation, mitigating the injection risk. Organizations using versions prior to 10.0.7 are advised to patch immediately. Additional mitigation steps include auditing monitor configurations for suspicious inputs, monitoring for unusual system activity, and restricting Probe server access if patching is delayed.
Source: https://gbhackers.com/oneuptime-command-injection-vulnerability/
OneUptime cybersecurity rating report: https://www.rankiteo.com/company/oneuptime
"id": "ONE1772454233",
"linkid": "oneuptime",
"type": "Vulnerability",
"date": "3/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'IT Monitoring and Management',
'name': 'OneUptime',
'type': 'Software Platform'}],
'attack_vector': 'Authenticated user input via monitor configurations',
'data_breach': {'data_exfiltration': 'Potential'},
'description': 'A severe command injection vulnerability, tracked as '
'CVE-2026-27728, has been discovered in OneUptime, a platform '
'used for monitoring and managing online services. The flaw '
'allows authenticated users to execute arbitrary operating '
'system commands on the Probe server, risking full system '
'compromise. The vulnerability resides in the '
'NetworkPathMonitor.performTraceroute() function within '
'OneUptime’s Probe Server component, which processes '
'user-controlled input without proper sanitization, enabling '
'command injection via shell metacharacters.',
'impact': {'data_compromised': 'Potential data exfiltration',
'operational_impact': 'Full system compromise, lateral movement',
'systems_affected': 'OneUptime Probe Server'},
'lessons_learned': 'Improper input sanitization in command execution '
'functions can lead to severe security vulnerabilities. '
'Direct use of exec() without proper validation is '
'dangerous.',
'post_incident_analysis': {'corrective_actions': 'Replaced exec() with '
'execFile(), released patch '
'(version 10.0.7)',
'root_causes': 'Improper input sanitization in '
'NetworkPathMonitor.performTraceroute() '
'function, use of exec() instead of '
'execFile()'},
'recommendations': 'Patch to version 10.0.7 or later immediately. Audit '
'monitor configurations for suspicious inputs. Restrict '
'Probe server access if patching is delayed. Replace '
'exec() with execFile() in similar functions to prevent '
'command injection.',
'references': [{'source': 'Vulnerability Disclosure'}],
'response': {'containment_measures': 'Patch released (version 10.0.7), '
'auditing monitor configurations, '
'monitoring for unusual system activity, '
'restricting Probe server access',
'enhanced_monitoring': 'Monitoring for unusual system activity',
'remediation_measures': 'Replaced exec() with execFile() to '
'mitigate injection risk'},
'title': 'Critical Command Injection Flaw in OneUptime Exposes Systems to '
'Remote Takeover',
'type': 'Command Injection',
'vulnerability_exploited': 'CVE-2026-27728'}