JustAppSec
Back to news

OneUptime patches unauthenticated workflow execution via ManualAPI

1 min readPublished 02 Apr 2026Updated 02 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — OneUptime’s Worker ManualAPI exposed workflow execution endpoints without authentication, so an attacker who can obtain or guess a workflow ID can remotely trigger arbitrary workflows.

What happened

OneUptime is an open-source monitoring and observability platform.

CVE-2026-35053 describes a missing authentication issue in OneUptime’s Worker service ManualAPI: the workflow execution endpoints GET /workflow/manual/run/:workflowId and POST /workflow/manual/run/:workflowId were exposed without any authentication middleware. The CVE states that an attacker who can obtain or guess a workflow ID can trigger workflow execution with attacker-controlled input data, enabling JavaScript code execution, notification abuse, and data manipulation.

Severity is CVSS v4.0 9.2 (Critical). Missing-auth bugs on “internal” worker/admin APIs are a recurring failure mode in microservice-style systems because a single mis-routed or unintentionally exposed endpoint can become an internet-reachable control plane.

Who is impacted

  • OneUptime deployments running versions prior to 10.0.42.
  • Environments where the Worker service’s ManualAPI endpoints are reachable by untrusted users and workflow IDs can be discovered or guessed.
ComponentAffected versions (per CVE record)Patched versions (per CVE record)
oneuptime< 10.0.4210.0.42

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.
    • "This issue has been patched in version 10.0.42."

  • Inventory any production services running OneUptime and confirm the deployed version (images, artifacts, or release tags).
  • Identify whether GET /workflow/manual/run/:workflowId and POST /workflow/manual/run/:workflowId are externally reachable in your deployment architecture, and prioritize those exposures for remediation.
  • If compromise is suspected, review logs for unexpected calls to the manual workflow execution endpoints and investigate for workflow runs containing attacker-controlled input.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.