CVE-2023-36821

CVSS Score of 10 (low)

Details

Published Jul 5, 2023
Updated: Jul 12, 2023
CWE ID 20

Summary

CVE-2023-36821: Uptime Kuma, a self-hosted monitoring tool prior to version 1.22.1, has a vulnerability that allows an authenticated attacker to install a maliciously crafted plugin, potentially leading to remote code execution. The vulnerability arises from the ability of authenticated users to install plugins from an official list using the web interface's disabled feature but still accessible API endpoints. By downloading and installing a plugin without validation or ignoring scripts, a maliciously crafted plugin can exploit npm scripts and execute remote code. Organizations using affected versions of Uptime Kuma should update to version 1.22.1 to mitigate this risk of unauthorized code execution. The severity of this vulnerability is rated as high (CVSS score: 8.8) due to its potential impact on confidentiality, integrity, and availability of the system.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-36821 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions