CVE-2023-36821
CVSS Score of 10 (low)
Details
Summary
CVE-2023-36821: Uptime Kuma, a self-hosted monitoring tool prior to version 1.22.1, has a vulnerability that allows an authenticated attacker to install a maliciously crafted plugin, potentially leading to remote code execution. The vulnerability arises from the ability of authenticated users to install plugins from an official list using the web interface's disabled feature but still accessible API endpoints. By downloading and installing a plugin without validation or ignoring scripts, a maliciously crafted plugin can exploit npm scripts and execute remote code. Organizations using affected versions of Uptime Kuma should update to version 1.22.1 to mitigate this risk of unauthorized code execution. The severity of this vulnerability is rated as high (CVSS score: 8.8) due to its potential impact on confidentiality, integrity, and availability of the system.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions