Vulnerability Description
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown viewer component renders Mermaid diagrams with securityLevel: "loose" and injects the SVG output via innerHTML. This configuration explicitly allows interactive event bindings in Mermaid diagrams, enabling XSS through Mermaid's click directive which can execute arbitrary JavaScript. Any field that renders markdown (incident descriptions, status page announcements, monitor notes) is vulnerable. This vulnerability is fixed in 10.0.23.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hackerbay | Oneuptime | < 10.0.23 |
Related Weaknesses (CWE)
References
- https://github.com/OneUptime/oneuptime/security/advisories/GHSA-wvh5-6vjm-23qhExploitMitigationVendor Advisory
FAQ
What is CVE-2026-32308?
CVE-2026-32308 is a vulnerability with a CVSS score of 7.6 (HIGH). OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown viewer component renders Mermaid diagrams with securityLevel: "loose" and injects the SVG output via...
How severe is CVE-2026-32308?
CVE-2026-32308 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32308?
Check the references section above for vendor advisories and patch information. Affected products include: Hackerbay Oneuptime.