Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26042: n/a

0
Medium
VulnerabilityCVE-2025-26042cvecve-2025-26042
Published: Mon Mar 17 2025 (03/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Uptime Kuma >== 1.23.0 has a ReDoS vulnerability, specifically when an administrator creates a notification through the web service. If a string is provided it triggers catastrophic backtracking in the regular expression, leading to a ReDoS attack.

AI-Powered Analysis

AILast updated: 01/26/2026, 16:20:31 UTC

Technical Analysis

CVE-2025-26042 identifies a ReDoS vulnerability in Uptime Kuma, an open-source self-hosted monitoring tool, specifically in versions 1.23.0 and later. The vulnerability arises when an administrator creates a notification through the web interface and inputs a string that triggers catastrophic backtracking in the underlying regular expression engine. Catastrophic backtracking occurs when certain regex patterns cause the engine to consume exponentially increasing CPU resources when processing crafted input, leading to denial of service. This vulnerability is classified under CWE-1333, which relates to inefficient regular expressions causing performance degradation. The attack vector is network-based (AV:N), requiring high attack complexity (AC:H), administrator privileges (PR:H), and user interaction (UI:R). The scope is unchanged (S:U), with low confidentiality impact (C:L), but high integrity (I:H) and availability (A:H) impacts, resulting in a CVSS v3.1 base score of 6.0 (medium severity). Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by attackers to disrupt monitoring services, potentially masking other malicious activities or causing operational downtime. The lack of available patches at the time of publication necessitates immediate mitigation strategies to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-26042 can be significant, particularly for those relying on Uptime Kuma for critical infrastructure monitoring and alerting. A successful ReDoS attack could exhaust server CPU resources, causing the monitoring service to become unresponsive or crash, leading to loss of visibility into system health and delayed incident response. This could indirectly affect confidentiality and integrity by allowing other attacks to go undetected. Organizations in sectors such as finance, healthcare, energy, and telecommunications, where uptime and monitoring are crucial, may face operational disruptions and compliance risks. The requirement for administrator privileges and user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments with insufficient access controls or insider threats. The medium severity rating reflects these factors but underscores the need for proactive defense to maintain service reliability and security posture.

Mitigation Recommendations

To mitigate CVE-2025-26042, European organizations should implement the following specific measures: 1) Restrict administrative access to Uptime Kuma to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2) Implement strict input validation and sanitization on notification creation forms to detect and reject potentially malicious regex patterns or excessively complex strings. 3) Monitor system resource usage closely for unusual CPU spikes that may indicate attempted ReDoS exploitation. 4) Isolate the Uptime Kuma service in a controlled network segment with limited exposure to reduce attack surface. 5) Stay informed about official patches or updates from Uptime Kuma developers and apply them promptly once available. 6) Conduct regular security audits and penetration testing focusing on web interface input handling. 7) Educate administrators about the risks of crafting complex regex patterns and encourage use of safe notification configurations. These targeted actions go beyond generic advice by focusing on access control, input handling, monitoring, and operational best practices specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697790e84623b1157ca22c84

Added to database: 1/26/2026, 4:06:00 PM

Last enriched: 1/26/2026, 4:20:31 PM

Last updated: 2/7/2026, 10:44:39 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats