{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T10:46:43.131","vulnerabilities":[{"cve":{"id":"CVE-2026-29779","sourceIdentifier":"security-advisories@github.com","published":"2026-03-07T16:15:54.953","lastModified":"2026-03-11T22:07:38.207","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for client use) and workerConfig (server-only, contains sensitive data) from the same module. Due to pages/incidents.tsx importing and using workerConfig directly inside client-side component code, the entire workerConfig object was included in the client-side JavaScript bundle served to all visitors. This issue has been patched via commit 377a596."},{"lang":"es","value":"UptimeFlare es una solución sin servidor de monitoreo de tiempo de actividad y página de estado, impulsada por Cloudflare Workers. Antes del commit 377a596, el archivo de configuración uptime.config.ts exportaba tanto pageConfig (seguro para uso del cliente) como workerConfig (solo para servidor, contiene datos sensibles) desde el mismo módulo. Debido a que pages/incidents.tsx importaba y usaba workerConfig directamente dentro del código del componente del lado del cliente, el objeto workerConfig completo se incluyó en el paquete JavaScript del lado del cliente servido a todos los visitantes. Este problema ha sido parcheado mediante el commit 377a596."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lyc8503:uptimeflare:*:*:*:*:*:*:*:*","versionEndExcluding":"2026-03-04","matchCriteriaId":"3F0BF86D-7167-41AE-A8B1-CC603467A5C2"}]}]}],"references":[{"url":"https://github.com/lyc8503/UptimeFlare/commit/377a5963c66ba9a798abebfe8d80378b053435e9","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/lyc8503/UptimeFlare/issues/198","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/lyc8503/UptimeFlare/security/advisories/GHSA-36q9-v7p3-vj6v","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}