CVE-2026-28787

HIGH

OneUptime <=10.0.11 - Auth Bypass

Title source: llm
STIX 2.1

Description

OneUptime is a solution for monitoring and managing online services. In version 10.0.11 and prior, the WebAuthn authentication implementation does not store the challenge on the server side. Instead, the challenge is returned to the client and accepted back from the client request body during verification. This violates the WebAuthn specification (W3C Web Authentication Level 2, §13.4.3) and allows an attacker who has obtained a valid WebAuthn assertion (e.g., via XSS, MitM, or log exposure) to replay it indefinitely, completely bypassing the second-factor authentication. No known patches are available.

Scores

CVSS v3 8.2
EPSS 0.0004
EPSS Percentile 13.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-294 CWE-287
Status published
Products (2)
hackerbay/oneuptime < 10.0.11
oneuptime/common 0npm
Published Mar 06, 2026
Tracked Since Mar 06, 2026