
CVE-2023-49805 – Uptime Kuma Missing Origin Validation in WebSockets
https://notcve.org/view.php?id=CVE-2023-49805
11 Dec 2023 — Uptime Kuma is an easy-to-use self-hosted monitoring tool. Prior to version 1.23.9, the application uses WebSocket (with Socket.io), but it does not verify that the source of communication is valid. This allows third-party website to access the application on behalf of their client. When connecting to the server using Socket.IO, the server does not validate the `Origin` header leading to other site being able to open connections to the server and communicate with it. Other websites still need to authenticat... • https://github.com/louislam/uptime-kuma/commit/2815cc73cfd9d8ced889e00e72899708220d184f • CWE-346: Origin Validation Error CWE-1385: Missing Origin Validation in WebSockets •

CVE-2023-49804 – Uptime Kuma Password Change Vulnerability
https://notcve.org/view.php?id=CVE-2023-49804
11 Dec 2023 — Uptime Kuma is an easy-to-use self-hosted monitoring tool. Prior to version 1.23.9, when a user changes their login password in Uptime Kuma, a previously logged-in user retains access without being logged out. This behavior persists consistently, even after system restarts or browser restarts. This vulnerability allows unauthorized access to user accounts, compromising the security of sensitive information. The same vulnerability was partially fixed in CVE-2023-44400, but logging existing users out of their... • https://github.com/louislam/uptime-kuma/commit/482049c72b3a650c7bc5c26c2f4d57a21c0e0aa0 • CWE-384: Session Fixation •

CVE-2023-49276 – Attribute Injection leading to XSS(Cross-Site-Scripting) in uptime-kuma
https://notcve.org/view.php?id=CVE-2023-49276
01 Dec 2023 — Uptime Kuma is an open source self-hosted monitoring tool. In affected versions the Google Analytics element in vulnerable to Attribute Injection leading to Cross-Site-Scripting (XSS). Since the custom status interface can set an independent Google Analytics ID and the template has not been sanitized, there is an attribute injection vulnerability here, which can lead to XSS attacks. This vulnerability has been addressed in commit `f28dccf4e` which is included in release version 1.23.7. Users are advised to ... • https://github.com/louislam/uptime-kuma/commit/f28dccf4e11f041564293e4f407e69ab9ee2277f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-44400 – Uptime Kuma has Persistentent User Sessions
https://notcve.org/view.php?id=CVE-2023-44400
09 Oct 2023 — Uptime Kuma is a self-hosted monitoring tool. Prior to version 1.23.3, attackers with access to a user's device can gain persistent account access. This is caused by missing verification of Session Tokens after password changes and/or elapsed inactivity periods. Version 1.23.3 has a patch for the issue. Uptime Kuma es una herramienta de monitoreo autohospedada. • https://github.com/louislam/uptime-kuma/commit/88afab6571ef7d4d41bb395cdb6ecd3968835a4a • CWE-384: Session Fixation •

CVE-2023-36822 – Uptime Kuma authenticated path traversal via plugin repository name may lead to unavailability or data loss
https://notcve.org/view.php?id=CVE-2023-36822
05 Jul 2023 — Uptime Kuma, a self-hosted monitoring tool, has a path traversal vulnerability in versions prior to 1.22.1. Uptime Kuma allows authenticated users to install plugins from an official list of plugins. This feature is currently disabled in the web interface, but the corresponding API endpoints are still available after login. Before a plugin is downloaded, the plugin installation directory is checked for existence. If it exists, it's removed before the plugin installation. • https://github.com/louislam/uptime-kuma/blob/de74efb2e6601dcbcfed32cddefc4078a80fcb0b/server/plugins-manager.js#L75-L80 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-36821 – Uptime Kuma vulnerable to authenticated remote code execution via malicious plugin installation
https://notcve.org/view.php?id=CVE-2023-36821
05 Jul 2023 — Uptime Kuma, a self-hosted monitoring tool, allows an authenticated attacker to install a maliciously crafted plugin in versions prior to 1.22.1, which may lead to remote code execution. Uptime Kuma allows authenticated users to install plugins from an official list of plugins. This feature is currently disabled in the web interface, but the corresponding API endpoints are still available after login. After downloading a plugin, it's installed by calling `npm install` in the installation directory of the pl... • https://github.com/louislam/uptime-kuma/blob/8c60e902e1c76ecbbd1b0423b07ce615341cb850/server/plugins-manager.js#L210-L216 • CWE-20: Improper Input Validation •

CVE-2023-26777 – Uptime Kuma 1.19.6 Cross Site Scripting
https://notcve.org/view.php?id=CVE-2023-26777
04 Apr 2023 — Cross Site Scripting vulnerability found in : louislam Uptime Kuma v.1.19.6 and before allows a remote attacker to execute arbitrary commands via the description, title, footer, and incident creation parameter of the status_page.js endpoint. Uptime Kuma versions 1.19.6 and below suffer from a cross site scripting vulnerability. • https://packetstorm.news/files/id/171699 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-25811 – Persistent Cross site scripting (XSS) in Uptime Kuma
https://notcve.org/view.php?id=CVE-2023-25811
21 Feb 2023 — Uptime Kuma is a self-hosted monitoring tool. In versions prior to 1.20.0 the Uptime Kuma `name` parameter allows a persistent XSS attack. Users are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-25810 – Persistent Cross site scripting (XSS) through description in status page in Uptime Kuma
https://notcve.org/view.php?id=CVE-2023-25810
21 Feb 2023 — Uptime Kuma is a self-hosted monitoring tool. In versions prior to 1.20.0 the Uptime Kuma status page allows a persistent XSS attack. Users are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/louislam/uptime-kuma/security/advisories/GHSA-wh8j-xr66-f296 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •