<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unauthenticated-Access — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unauthenticated-access/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 19:21:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unauthenticated-access/feed.xml" rel="self" type="application/rss+xml"/><item><title>OneUptime Unauthenticated Endpoint Access Vulnerability (CVE-2026-34758)</title><link>https://feed.craftedsignal.io/briefs/2026-04-oneuptime-rce/</link><pubDate>Thu, 02 Apr 2026 19:21:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-oneuptime-rce/</guid><description>OneUptime versions prior to 10.0.42 are vulnerable to unauthenticated access to Notification test and Phone Number management endpoints, leading to potential abuse of SMS, Call, Email, and WhatsApp functionalities, and unauthorized phone number purchases, fixed in version 10.0.42.</description><content:encoded><![CDATA[<p>OneUptime, an open-source monitoring and observability platform, is susceptible to a critical vulnerability (CVE-2026-34758) affecting versions prior to 10.0.42. This vulnerability stems from the lack of authentication on critical Notification test and Phone Number management endpoints. Exploitation of this flaw could enable attackers to abuse SMS, call, email, and WhatsApp functionalities, potentially sending unsolicited messages or incurring costs for the affected organization. Furthermore, the vulnerability permits unauthorized phone number purchases, leading to financial and reputational damage. The vulnerability was reported on April 2, 2026, and patched in version 10.0.42. Organizations using affected versions of OneUptime should upgrade immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OneUptime instance running a version prior to 10.0.42.</li>
<li>The attacker crafts a malicious HTTP request targeting the unauthenticated Notification test endpoint (e.g., <code>/api/notification/test</code>).</li>
<li>The attacker injects arbitrary parameters into the request to control the SMS, Call, Email, or WhatsApp message content and recipients.</li>
<li>The OneUptime server processes the request without authentication, triggering the sending of attacker-controlled messages.</li>
<li>The attacker crafts a malicious HTTP request targeting the unauthenticated Phone Number management endpoint (e.g., <code>/api/phone-number/purchase</code>).</li>
<li>The attacker provides details for a phone number purchase.</li>
<li>The OneUptime server processes the request without authentication, initiating a phone number purchase, potentially incurring financial charges.</li>
<li>The attacker leverages the purchased phone number for malicious activities, such as phishing or social engineering attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34758 can lead to significant repercussions. Attackers can abuse messaging services, sending spam, phishing links, or malicious content via SMS, email, and WhatsApp, impacting potentially thousands of users. Furthermore, unauthorized phone number purchases can result in unexpected financial costs and create opportunities for attackers to conduct further malicious activities, damaging the organization&rsquo;s reputation and potentially leading to legal liabilities. The vulnerable versions of OneUptime expose organizations to significant risk until upgraded to version 10.0.42 or later.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade OneUptime installations to version 10.0.42 or later to patch CVE-2026-34758.</li>
<li>Monitor web server logs for suspicious requests to the <code>/api/notification/test</code> and <code>/api/phone-number/purchase</code> endpoints, as described in the Attack Chain.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated OneUptime Notification Test Access&rdquo; to identify potential exploitation attempts in real-time.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated OneUptime Phone Number Purchase Access&rdquo; to identify potential exploitation attempts in real-time.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>oneuptime</category><category>unauthenticated-access</category></item></channel></rss>