๐Ÿ” CVE Alert

CVE-2026-32598

UNKNOWN 0.0

OneUptime: Password Reset Token Logged at INFO Level

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.24, the password reset flow logs the complete password reset URL โ€” containing the plaintext reset token โ€” at INFO log level, which is enabled by default in production. Anyone with access to application logs (log aggregation, Docker logs, Kubernetes pod logs) can intercept reset tokens and perform account takeover on any user. This vulnerability is fixed in 10.0.24.

CWE CWE-532
Vendor oneuptime
Product oneuptime
Published Mar 12, 2026
Last Updated Mar 14, 2026
Stay Ahead of the Next One

Get instant alerts for oneuptime oneuptime

Be the first to know when new unknown vulnerabilities affecting oneuptime oneuptime are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

OneUptime / oneuptime
< 10.0.24

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/OneUptime/oneuptime/security/advisories/GHSA-4524-cj9j-g4fj