Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jmhp-5558-qxh5 | OneUptime: OS Command Injection in Probe NetworkPathMonitor via unsanitized destination in traceroute exec() |
Mon, 02 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hackerbay
Hackerbay oneuptime |
|
| CPEs | cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Hackerbay
Hackerbay oneuptime |
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oneuptime
Oneuptime oneuptime |
|
| Vendors & Products |
Oneuptime
Oneuptime oneuptime |
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.7, an OS command injection vulnerability in `NetworkPathMonitor.performTraceroute()` allows any authenticated project user to execute arbitrary operating system commands on the Probe server by injecting shell metacharacters into a monitor's destination field. Version 10.0.7 fixes the vulnerability. | |
| Title | OneUptime: OS Command Injection in Probe NetworkPathMonitor via unsanitized destination in traceroute exec() | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T20:19:55.906Z
Reserved: 2026-02-23T18:37:14.789Z
Link: CVE-2026-27728
No data.
Status : Analyzed
Published: 2026-02-25T17:25:40.103
Modified: 2026-03-02T18:56:30.610
Link: CVE-2026-27728
No data.
OpenCVE Enrichment
Updated: 2026-04-17T15:15:21Z
Github GHSA