On March 15, 2026, a critical vulnerability was disclosed in the OneUptime open-source observability platform. Tracked as CVE-2026-32306, the flaw is an SQL injection with a CVSS 3.1 score of 9.9, indicating its extreme severity. The vulnerability allows an authenticated attacker with low-level privileges (e.g., basic project access) to gain full control over the underlying ClickHouse database. This enables the attacker to bypass multi-tenancy controls to read and modify data belonging to all other users on the platform. More alarmingly, it could lead to full remote code execution (RCE) on the server. This is the fourth critical flaw discovered in OneUptime in a six-week period, signaling a pattern of severe security issues that requires immediate attention from administrators of self-hosted instances.
CVE-2026-32306aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters in the API request are not properly sanitized. They are directly interpolated into a SQL query string that is then executed by the ClickHouse database, rather than being treated as data via parameterized queries. This allows an attacker to inject arbitrary SQL commands.An example malicious request might look like this:
{
"aggregationType": "sum",
"aggregateColumnName": "(SELECT groupArray(name) FROM system.tables)",
"aggregationTimestampColumnName": "timestamp"
}
This would allow an attacker to start enumerating database tables, eventually leading to data theft or RCE.
10.0.23.A successful exploit of CVE-2026-32306 has severe consequences:
table functions, which can read from files or even execute shell commands in some configurations, to gain a shell on the underlying server, leading to a full system compromise.The recurring nature of critical vulnerabilities in OneUptime suggests a systemic issue in its secure development lifecycle, and organizations should consider the platform a high-risk asset requiring stringent security controls and monitoring.
10.0.23, you are vulnerable.SELECT statements, system table lookups (system.tables), or other unexpected SQL syntax within the aggregation parameters.UNION SELECT, --, ';') within the specific API parameters (aggregationType, aggregateColumnName).The primary mitigation is to update OneUptime to the patched version 10.0.23.
Using a WAF to filter malicious requests acts as a virtual patch and a form of exploit protection.
Running the OneUptime application and its database in a containerized or sandboxed environment could limit the impact of a successful RCE.
For critical vulnerabilities like CVE-2026-32306 in OneUptime, the most effective and urgent defensive action is Software Update. Organizations running self-hosted instances must prioritize the immediate deployment of patch 10.0.23. This should be handled by a dedicated patch management team or automated system with an emergency change control process. Before deployment in production, the patch should be quickly validated in a staging environment to ensure it doesn't break functionality. After patching, it's crucial to verify that the update was successful by checking the application's version number. Given OneUptime's recent history of severe flaws, administrators should subscribe to the project's security advisories and establish a rapid response plan specifically for this high-risk asset. Failing to patch promptly leaves the door wide open for trivial exploitation by any low-privileged user.
As a compensating control or a defense-in-depth layer, a Web Application Firewall (WAF) can be used to virtually patch CVE-2026-32306. A custom rule should be created that specifically targets the vulnerable API endpoint. The rule should inspect the body of POST requests to the OneUptime telemetry API. If the request contains SQL-like syntax (e.g., 'SELECT', 'UNION', '--', ';') within the aggregateColumnName or other vulnerable parameters, the request should be blocked and a high-priority alert should be generated. While this is not a substitute for patching the underlying code, it provides a critical layer of protection against exploitation attempts, especially in the window between vulnerability disclosure and patch deployment. This targeted WAF rule hardens the application against this specific attack vector.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats