Critical CVSS 9.9 SQL Injection Flaw (CVE-2026-32306) Hits OneUptime Platform

OneUptime Hit with Critical SQL Injection Flaw (CVSS 9.9)

CRITICAL
March 15, 2026
4m read
VulnerabilityPatch Management

Related Entities

Products & Tech

OneUptimeClickHouse

CVE Identifiers

CVE-2026-32306
CRITICAL
CVSS:9.9

Full Report

Executive Summary

On March 15, 2026, a critical vulnerability was disclosed in the OneUptime open-source observability platform. Tracked as CVE-2026-32306, the flaw is an SQL injection with a CVSS 3.1 score of 9.9, indicating its extreme severity. The vulnerability allows an authenticated attacker with low-level privileges (e.g., basic project access) to gain full control over the underlying ClickHouse database. This enables the attacker to bypass multi-tenancy controls to read and modify data belonging to all other users on the platform. More alarmingly, it could lead to full remote code execution (RCE) on the server. This is the fourth critical flaw discovered in OneUptime in a six-week period, signaling a pattern of severe security issues that requires immediate attention from administrators of self-hosted instances.


Vulnerability Details

  • CVE ID: CVE-2026-32306
  • CVSS Score: 9.9 (Critical)
  • Vulnerability Type: SQL Injection
  • Attack Vector: The flaw exists in the telemetry API of the OneUptime platform. An attacker with valid, low-privilege credentials can send a crafted request to this API.
  • Root Cause: The aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters in the API request are not properly sanitized. They are directly interpolated into a SQL query string that is then executed by the ClickHouse database, rather than being treated as data via parameterized queries. This allows an attacker to inject arbitrary SQL commands.

An example malicious request might look like this:

{
  "aggregationType": "sum",
  "aggregateColumnName": "(SELECT groupArray(name) FROM system.tables)",
  "aggregationTimestampColumnName": "timestamp"
}

This would allow an attacker to start enumerating database tables, eventually leading to data theft or RCE.


Affected Systems

  • Product: OneUptime open-source observability platform
  • Affected Versions: All versions prior to 10.0.23.
  • Deployment Model: The vulnerability primarily affects organizations that are self-hosting OneUptime instances. The cloud-hosted version is managed by the vendor.

Impact Assessment

A successful exploit of CVE-2026-32306 has severe consequences:

  • Multi-Tenancy Bypass: An attacker in one tenant can read, modify, or delete telemetry data belonging to all other tenants on the same instance.
  • Data Breach: Sensitive operational data, metrics, and logs from all customers can be exfiltrated.
  • Remote Code Execution (RCE): Advanced attackers can leverage ClickHouse's table functions, which can read from files or even execute shell commands in some configurations, to gain a shell on the underlying server, leading to a full system compromise.

The recurring nature of critical vulnerabilities in OneUptime suggests a systemic issue in its secure development lifecycle, and organizations should consider the platform a high-risk asset requiring stringent security controls and monitoring.


Detection Methods

  1. Version Scanning: The most reliable method is to check the version of your OneUptime instance. If it is below 10.0.23, you are vulnerable.
  2. Log Analysis: Monitor ClickHouse database query logs for suspicious queries. Look for queries originating from the telemetry API that contain nested SELECT statements, system table lookups (system.tables), or other unexpected SQL syntax within the aggregation parameters.
  3. WAF/IPS Signatures: A Web Application Firewall (WAF) can be configured with rules to detect common SQL injection patterns (e.g., UNION SELECT, --, ';') within the specific API parameters (aggregationType, aggregateColumnName).

Remediation Steps

  1. Patch Immediately: The primary and most urgent remediation is to upgrade all self-hosted OneUptime instances to version 10.0.23 or later. This version contains the patch that properly sanitizes the vulnerable parameters.
  2. Apply Compensating Controls (if patching is delayed):
    • Use a WAF to create a virtual patch that blocks requests to the telemetry API containing SQL-like syntax in the vulnerable parameters.
    • Restrict access to the OneUptime platform to trusted IP addresses only.
    • Review all user accounts and enforce the principle of least privilege, though this is a weak mitigation as the flaw can be exploited by any authenticated user.
  3. Review Logs for Compromise: After patching, review historical database and application logs for any signs of exploitation to determine if a breach occurred before the patch was applied.
  4. D3FEND Mitigation: The core remediation is a direct application of D3-SU: Software Update.

Timeline of Events

1
March 15, 2026
The critical SQL injection vulnerability CVE-2026-32306 in OneUptime is publicly disclosed.
2
March 15, 2026
This article was published

MITRE ATT&CK Mitigations

The primary mitigation is to update OneUptime to the patched version 10.0.23.

Using a WAF to filter malicious requests acts as a virtual patch and a form of exploit protection.

Running the OneUptime application and its database in a containerized or sandboxed environment could limit the impact of a successful RCE.

D3FEND Defensive Countermeasures

For critical vulnerabilities like CVE-2026-32306 in OneUptime, the most effective and urgent defensive action is Software Update. Organizations running self-hosted instances must prioritize the immediate deployment of patch 10.0.23. This should be handled by a dedicated patch management team or automated system with an emergency change control process. Before deployment in production, the patch should be quickly validated in a staging environment to ensure it doesn't break functionality. After patching, it's crucial to verify that the update was successful by checking the application's version number. Given OneUptime's recent history of severe flaws, administrators should subscribe to the project's security advisories and establish a rapid response plan specifically for this high-risk asset. Failing to patch promptly leaves the door wide open for trivial exploitation by any low-privileged user.

As a compensating control or a defense-in-depth layer, a Web Application Firewall (WAF) can be used to virtually patch CVE-2026-32306. A custom rule should be created that specifically targets the vulnerable API endpoint. The rule should inspect the body of POST requests to the OneUptime telemetry API. If the request contains SQL-like syntax (e.g., 'SELECT', 'UNION', '--', ';') within the aggregateColumnName or other vulnerable parameters, the request should be blocked and a high-priority alert should be generated. While this is not a substitute for patching the underlying code, it provides a critical layer of protection against exploitation attempts, especially in the window between vulnerability disclosure and patch deployment. This targeted WAF rule hardens the application against this specific attack vector.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

SQL InjectionRCEOpen SourceObservabilityMulti-tenancy

📢 Share This Article

Help others stay informed about cybersecurity threats