Cyber Posture

CVE-2026-30887

CriticalPublic PoCRCE

Published: 10 March 2026

Published
10 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0006 19.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30887 is a critical-severity Code Injection (CWE-94) vulnerability in Hackerbay Oneuptime. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique JavaScript (T1059.007); ranked at the 19.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-18 (Mobile Code) and SC-39 (Process Isolation).

Threat & Defense at a Glance

What attackers do: exploitation maps to JavaScript (T1059.007) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires controls on the execution of untrusted mobile code such as user-supplied Playwright/JavaScript in Synthetic Monitors to prevent sandbox bypass and RCE.

prevent

Mandates process isolation to block prototype-chain escapes from user code environments accessing the underlying Node.js process and enabling arbitrary command execution.

prevent

Ensures timely remediation of flaws like the insecure Node.js vm module sandbox escape fixed in version 10.0.18.

MITRE ATT&CK Enterprise TechniquesAI

T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Sandbox escape in Node.js vm via attacker-supplied JS directly enables arbitrary code execution (T1059.007); low-priv project member to container RCE and cluster compromise is classic exploitation for privilege escalation (T1068); post-RCE extraction of DB/cluster creds from process.env matches unsecured credentials (T1552).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.18, OneUptime allows project members to run custom Playwright/JavaScript code via Synthetic Monitors to test websites. However, the system executes this untrusted user code inside the insecure Node.js…

more

vm module. By leveraging a standard prototype-chain escape (this.constructor.constructor), an attacker can bypass the sandbox, gain access to the underlying Node.js process object, and execute arbitrary system commands (RCE) on the oneuptime-probe container. Furthermore, because the probe holds database/cluster credentials in its environment variables, this directly leads to a complete cluster compromise. This vulnerability is fixed in 10.0.18.

Deeper analysisAI

CVE-2026-30887 is a critical vulnerability in OneUptime, an open-source solution for monitoring and managing online services, affecting versions prior to 10.0.18. The issue lies in the Synthetic Monitors feature, which permits project members to execute custom Playwright/JavaScript code for website testing. This untrusted code runs within the insecure Node.js vm module, allowing attackers to perform a prototype-chain escape, such as via this.constructor.constructor, to bypass the sandbox and access the underlying Node.js process object.

Project members with low privileges (PR:L) can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N), achieving remote code execution (RCE) on the oneuptime-probe container and escalating to a complete cluster compromise. The probe container holds database and cluster credentials in environment variables, enabling attackers to extract these secrets post-exploitation. The vulnerability carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and maps to CWE-94 (improper control of generation of code).

OneUptime addressed this vulnerability in version 10.0.18. The GitHub Security Advisory at GHSA-h343-gg57-2q67 provides details on the fix and recommends upgrading to the patched version to mitigate the sandbox escape and RCE risks.

Details

CWE(s)

Affected Products

hackerbay
oneuptime
≤ 10.0.18

CVEs Like This One

CVE-2026-27574Same product: Hackerbay Oneuptime
CVE-2026-30921Same product: Hackerbay Oneuptime
CVE-2026-30956Same product: Hackerbay Oneuptime
CVE-2026-33396Same product: Hackerbay Oneuptime
CVE-2026-30957Same product: Hackerbay Oneuptime
CVE-2026-35053Same product: Hackerbay Oneuptime
CVE-2026-32308Same product: Hackerbay Oneuptime
CVE-2026-28787Same product: Hackerbay Oneuptime
CVE-2026-33143Same product: Hackerbay Oneuptime
CVE-2026-33142Same product: Hackerbay Oneuptime

References