CVE-2026-28787

8.2 HIGH

📋 TL;DR

This vulnerability in OneUptime allows attackers to bypass two-factor authentication by replaying stolen WebAuthn assertions. The flaw occurs because the server doesn't store authentication challenges, violating WebAuthn specifications. All OneUptime users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • OneUptime
Versions: 10.0.11 and prior
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with WebAuthn authentication enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover for all users with WebAuthn enabled, allowing attackers to access monitoring dashboards, modify configurations, and potentially compromise monitored services.

🟠

Likely Case

Targeted attacks against administrators or privileged users to gain unauthorized access to OneUptime management interfaces.

🟢

If Mitigated

Limited impact if WebAuthn is disabled or if additional authentication layers are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires obtaining a valid WebAuthn assertion first (via XSS, MitM, or log exposure), then replaying it.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://github.com/OneUptime/oneuptime/security/advisories/GHSA-gjjc-pcwp-c74m

Restart Required: No

Instructions:

No official patch available. Monitor vendor advisory for updates.

🔧 Temporary Workarounds

Disable WebAuthn Authentication

all

Temporarily disable WebAuthn two-factor authentication until a patch is available

Implement Additional Authentication Controls

all

Add IP whitelisting or rate limiting to authentication endpoints

🧯 If You Can't Patch

  • Disable WebAuthn authentication entirely and use alternative 2FA methods
  • Implement network segmentation to restrict access to OneUptime instances

🔍 How to Verify

Check if Vulnerable:

Check if running OneUptime version 10.0.11 or earlier with WebAuthn enabled

Check Version:

Check OneUptime dashboard or configuration files for version information

Verify Fix Applied:

Verify WebAuthn is disabled or monitor for vendor patch release

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful WebAuthn authentications from same assertion
  • Rapid authentication attempts with similar challenge values

Network Indicators:

  • Repeated authentication requests with identical payloads

SIEM Query:

source="oneuptime" AND event="webauthn_authentication" | stats count by user, assertion_id

🔗 References

📤 Share & Export