{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T04:50:13.259","vulnerabilities":[{"cve":{"id":"CVE-2026-30921","sourceIdentifier":"security-advisories@github.com","published":"2026-03-10T17:40:16.160","lastModified":"2026-03-12T13:44:49.127","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current implementation, this untrusted code is run inside Node's vm and is given live host Playwright objects such as browser and page. This creates a distinct server-side RCE primitive: the attacker does not need the classic this.constructor.constructor(...) sandbox escape. Instead, the attacker can directly use the injected Playwright browser object to reach browser.browserType().launch(...) and spawn an arbitrary executable on the probe host/container. This vulnerability is fixed in 10.0.20."},{"lang":"es","value":"OneUptime es una solución para monitorear y gestionar servicios en línea. Antes de la versión 10.0.20, los Monitores Sintéticos de OneUptime permiten a usuarios de proyecto con bajos privilegios enviar código Playwright personalizado que se ejecuta en el servicio oneuptime-probe. En la implementación actual, este código no confiable se ejecuta dentro de la vm de Node y se le otorgan objetos Playwright de host en vivo como navegador y página. Esto crea una primitiva RCE del lado del servidor distinta: el atacante no necesita el clásico escape de sandbox this.constructor.constructor(...). En su lugar, el atacante puede usar directamente el objeto navegador de Playwright inyectado para alcanzar browser.browserType().launch(...) y generar un ejecutable arbitrario en el host/contenedor de la sonda. Esta vulnerabilidad se corrige en la versión 10.0.20."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-749"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.20","matchCriteriaId":"47A8362E-263D-46E0-8339-83F9AFDC973D"}]}]}],"references":[{"url":"https://github.com/OneUptime/oneuptime/security/advisories/GHSA-4j36-39gm-8vq8","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}