Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hackerbay
Hackerbay oneuptime |
|
| CPEs | cpe:2.3:a:hackerbay:oneuptime:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Hackerbay
Hackerbay oneuptime |
|
| Metrics |
cvssV3_1
|
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oneuptime
Oneuptime oneuptime |
|
| Vendors & Products |
Oneuptime
Oneuptime oneuptime |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, the Worker service's ManualAPI exposes workflow execution endpoints (GET /workflow/manual/run/:workflowId and POST /workflow/manual/run/:workflowId) without any authentication middleware. An attacker who can obtain or guess a workflow ID can trigger arbitrary workflow execution with attacker-controlled input data, enabling JavaScript code execution, notification abuse, and data manipulation. This issue has been patched in version 10.0.42. | |
| Title | OneUptime: Unauthenticated Workflow Execution via ManualAPI | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T15:46:38.420Z
Reserved: 2026-03-31T21:06:06.429Z
Link: CVE-2026-35053
Updated: 2026-04-03T15:46:32.034Z
Status : Analyzed
Published: 2026-04-02T20:16:29.117
Modified: 2026-04-13T18:46:50.110
Link: CVE-2026-35053
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:41:53Z