Cyber Posture

CVE-2026-30956

CriticalPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0005 16.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30956 is a critical-severity Improper Authorization (CWE-285) vulnerability in Hackerbay Oneuptime. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 16.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-4 (Information Flow Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 4 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 mandates enforcement of approved authorizations for logical access, directly preventing bypasses of permission checks and tenant scoping via forged client-supplied headers.

prevent

SI-10 requires validation of all information inputs, including untrusted headers like is-multi-tenant-query and projectid, to block exploitation through forged values.

prevent

AC-4 enforces approved information flow policies to maintain tenant isolation and prevent cross-tenant data access and account takeover.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Authorization bypass in public-facing web app directly enables exploitation for privilege escalation (T1068), valid account abuse/takeover (T1078), account manipulation via password reset (T1098), public app exploitation (T1190), and unsecured credential exposure (T1552).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header together with a controlled projectid header. Because…

more

the server trusts this client-supplied header, internal permission checks in BasePermission are skipped and tenant scoping is disabled. This allows attackers to access project data belonging to other tenants, read sensitive User fields via nested relations, leak plaintext resetPasswordToken, and reset the victim’s password and fully take over the account. This results in cross‑tenant data exposure and full account takeover. This vulnerability is fixed in 10.0.21.

Deeper analysisAI

CVE-2026-30956 is an authorization bypass and tenant isolation vulnerability affecting OneUptime, an open-source solution for monitoring and managing online services. In versions 10.0.20 and earlier, the server trusts client-supplied headers, specifically a forged "is-multi-tenant-query" header combined with a controlled "projectid" header. This skips internal permission checks in the BasePermission component and disables tenant scoping, leading to improper access control (CWE-285) and missing authorization (CWE-862). The issue has a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).

A low-privileged user within OneUptime can exploit this remotely over the network with low complexity and no user interaction required. By crafting and sending the malicious headers, the attacker bypasses tenant boundaries to access project data from other tenants, read sensitive User fields through nested relations, leak plaintext resetPasswordToken values, reset victims' passwords, and achieve full account takeover. This enables cross-tenant data exposure and complete compromise of targeted accounts.

The vulnerability is fixed in OneUptime version 10.0.21, as detailed in the project's GitHub release notes (https://github.com/OneUptime/oneuptime/releases/tag/10.0.21) and security advisory (https://github.com/OneUptime/oneuptime/security/advisories/GHSA-r5v6-2599-9g3m). Security practitioners should upgrade to 10.0.21 or later to mitigate the risks.

Details

CWE(s)

Affected Products

hackerbay
oneuptime
≤ 10.0.21

CVEs Like This One

CVE-2026-34759Same product: Hackerbay Oneuptime
CVE-2026-28787Same product: Hackerbay Oneuptime
CVE-2026-33396Same product: Hackerbay Oneuptime
CVE-2026-30920Same product: Hackerbay Oneuptime
CVE-2026-30921Same product: Hackerbay Oneuptime
CVE-2026-30887Same product: Hackerbay Oneuptime
CVE-2026-27574Same product: Hackerbay Oneuptime
CVE-2026-33142Same product: Hackerbay Oneuptime
CVE-2026-34840Same product: Hackerbay Oneuptime
CVE-2026-33143Same product: Hackerbay Oneuptime

References