OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation
Moderate severity
GitHub Reviewed
Published
Nov 25, 2025
in
OneUptime/oneuptime
•
Updated Nov 27, 2025
Description
Published to the GitHub Advisory Database
Nov 25, 2025
Reviewed
Nov 25, 2025
Published by the National Vulnerability Database
Nov 26, 2025
Last updated
Nov 27, 2025
Summary
During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, a user is able to gain access to the admin dashboard interface. However, despite accessing the admin panel, the user does not have sufficient permissions to view or interact with actual data.
PoC
Intercept the login response and change "isMasterAdmin": false → "isMasterAdmin": true


Impact
The admin dashboard is viewable.
References