Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. oneuptime
  4. ›
  5. CVE-2026-32598

CVE-2026-32598: OneUptime: Password Reset Token Logged at INFO Level

March 13, 2026 (updated March 16, 2026)

The password reset flow logs the complete password reset URL — containing the plaintext reset token — at INFO log level, which is enabled by default in production. Anyone with access to application logs (log aggregation, Docker logs, Kubernetes pod logs) can intercept reset tokens and perform account takeover on any user.

References

  • github.com/OneUptime/oneuptime
  • github.com/OneUptime/oneuptime/releases/tag/10.0.23
  • github.com/OneUptime/oneuptime/security/advisories/GHSA-4524-cj9j-g4fj
  • github.com/advisories/GHSA-4524-cj9j-g4fj
  • nvd.nist.gov/vuln/detail/CVE-2026-32598

Code Behaviors & Features

Detect and mitigate CVE-2026-32598 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.0.23

Fixed versions

  • 10.0.23

Solution

Upgrade to version 10.0.23 or above.

Impact 6.2 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

npm/oneuptime/CVE-2026-32598.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:18:49 +0000.