CVE-2026-30920

8.6 HIGH

📋 TL;DR

This vulnerability in OneUptime allows attackers to hijack GitHub App installations and manipulate project repositories without proper authorization. Attackers can overwrite another project's GitHub App binding and create unauthorized CodeRepository records. All OneUptime instances running versions before 10.0.19 are affected.

💻 Affected Systems

Products:
  • OneUptime
Versions: All versions prior to 10.0.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with GitHub App integration enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of GitHub App integrations across all projects, unauthorized repository enumeration, and injection of malicious code repositories into production systems.

🟠

Likely Case

Unauthorized modification of GitHub App bindings leading to service disruption, repository enumeration exposing sensitive information, and unauthorized code repository creation.

🟢

If Mitigated

Limited impact due to network segmentation and strict access controls, but still potential for unauthorized configuration changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires GitHub App access but authorization bypass makes it straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.19

Vendor Advisory: https://github.com/OneUptime/oneuptime/security/advisories/GHSA-656w-6f6c-m9r6

Restart Required: Yes

Instructions:

1. Backup your OneUptime instance. 2. Update to version 10.0.19 or later. 3. Restart the OneUptime service. 4. Verify GitHub App integrations are functioning correctly.

🔧 Temporary Workarounds

Disable GitHub App Integration

all

Temporarily disable GitHub App functionality until patching is complete.

# Edit OneUptime configuration to disable GitHub App features
# Restart service after configuration change

Network Isolation

linux

Restrict network access to OneUptime GitHub callback endpoints.

# Configure firewall rules to restrict access to /github/callback endpoints
# Example: iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IPS] -j ACCEPT

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OneUptime from production systems
  • Enable detailed logging and monitoring for all GitHub App integration activities

🔍 How to Verify

Check if Vulnerable:

Check OneUptime version via admin interface or by examining package version. If version is below 10.0.19, system is vulnerable.

Check Version:

docker inspect oneuptime | grep version  OR  cat /usr/local/oneuptime/package.json | grep version

Verify Fix Applied:

Confirm version is 10.0.19 or higher and test GitHub App integration functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized GitHub App installation ID modifications
  • Unexpected CodeRepository creation events
  • Failed authorization attempts on GitHub callback endpoints

Network Indicators:

  • Unusual traffic patterns to /github/callback endpoints
  • Requests with manipulated state or installation_id parameters

SIEM Query:

source="oneuptime" AND (event="github_app_callback" OR event="code_repository_create") AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export