Cyber Posture

CVE-2026-33143

HighPublic PoC

Published: 20 March 2026

Published
20 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0004 12.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33143 is a high-severity Insufficient Verification of Data Authenticity (CWE-345) vulnerability in Hackerbay Oneuptime. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-9 (Service Identification and Authentication) and SC-8 (Transmission Confidentiality and Integrity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires integrity verification mechanisms such as HMAC signatures to detect and prevent processing of forged WhatsApp webhook payloads.

prevent

Implements cryptographic mechanisms to protect the integrity of incoming webhook transmissions against unauthorized modification.

prevent

Mandates authentication of external services like WhatsApp using signature verification before processing webhook requests.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Lack of HMAC signature verification on public /notification/whatsapp/webhook endpoint directly enables unauthenticated exploitation of a public-facing application (T1190) and forged payload processing that manipulates stored notification status records/audit trails (T1565.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature, allowing any unauthenticated attacker to send forged webhook…

more

payloads that manipulate notification delivery status records, suppress alerts, and corrupt audit trails. The codebase already implements proper signature verification for Slack webhooks. This issue has been patched in version 10.0.34.

Deeper analysisAI

CVE-2026-33143 affects OneUptime, an open-source solution for monitoring and managing online services, specifically versions prior to 10.0.34. The vulnerability resides in the WhatsApp POST webhook handler at the endpoint /notification/whatsapp/webhook, which processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature. This flaw, classified under CWE-345 (Insufficient Verification of Data Authenticity) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), enables improper handling of webhook payloads, unlike the properly verified Slack webhook implementation in the same codebase.

Any unauthenticated attacker with network access can exploit this vulnerability by sending forged webhook payloads to the affected endpoint. Successful exploitation allows manipulation of notification delivery status records, suppression of alerts, and corruption of audit trails, potentially disrupting incident response and monitoring integrity without requiring privileges, user interaction, or impacting confidentiality or availability directly.

The GitHub security advisory at https://github.com/OneUptime/oneuptime/security/advisories/GHSA-g5ph-f57v-mwjc confirms that the issue has been patched in OneUptime version 10.0.34 by implementing proper signature verification for WhatsApp webhooks, urging users to upgrade immediately to mitigate the risk.

Details

CWE(s)

Affected Products

hackerbay
oneuptime
≤ 10.0.34

CVEs Like This One

CVE-2026-30920Same product: Hackerbay Oneuptime
CVE-2026-34759Same product: Hackerbay Oneuptime
CVE-2026-34840Same product: Hackerbay Oneuptime
CVE-2026-33142Same product: Hackerbay Oneuptime
CVE-2026-35053Same product: Hackerbay Oneuptime
CVE-2026-33396Same product: Hackerbay Oneuptime
CVE-2026-27728Same product: Hackerbay Oneuptime
CVE-2026-28787Same product: Hackerbay Oneuptime
CVE-2026-30958Same product: Hackerbay Oneuptime
CVE-2026-32306Same product: Hackerbay Oneuptime

References