Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32230: CWE-862: Missing Authorization in louislam uptime-kuma

0
Medium
VulnerabilityCVE-2026-32230cvecve-2026-32230cwe-862
Published: Thu Mar 12 2026 (03/12/2026, 18:13:58 UTC)
Source: CVE Database V5
Vendor/Project: louislam
Product: uptime-kuma

Description

CVE-2026-32230 is a medium severity vulnerability in Uptime Kuma versions 2. 0. 0 through 2. 1. 3 where the GET /api/badge/:id/ping/:duration? endpoint fails to verify authorization properly. This flaw allows unauthenticated users to access average ping/response time data for private monitors, bypassing the intended access control that restricts such data to public monitors only. The vulnerability arises from missing authorization checks on this specific endpoint, while other badge endpoints correctly enforce public group verification. Exploitation requires no authentication or user interaction and can lead to unauthorized disclosure of monitoring data. The issue is fixed in version 2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:34:54 UTC

Technical Analysis

Uptime Kuma is an open-source, self-hosted monitoring tool used to track uptime and response times of various services. Versions 2.0.0 through 2.1.3 contain a vulnerability (CVE-2026-32230) classified under CWE-862 (Missing Authorization). Specifically, the GET /api/badge/:id/ping/:duration? endpoint in the server's API router does not verify whether the requested monitor belongs to a public group before returning data. In contrast, other badge-related endpoints include a SQL query condition enforcing public=1, ensuring only public monitors' data is accessible. The ping endpoint omits this check, allowing unauthenticated attackers to retrieve average ping and response time metrics for private monitors. This unauthorized data disclosure could reveal sensitive operational information about internal systems or services that organizations intended to keep private. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The flaw was addressed and fixed in Uptime Kuma version 2.2.0. The CVSS v3.1 base score is 5.3 (medium severity), with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), confidentiality impact low (C:L), and no impact on integrity or availability (I:N/A:N). No known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of monitoring data related to private monitors. Organizations relying on Uptime Kuma for internal service monitoring could inadvertently expose sensitive operational metrics such as average ping and response times to unauthenticated external actors. This information could aid attackers in reconnaissance activities, enabling them to identify critical internal services, assess their responsiveness, and potentially plan targeted attacks. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could undermine organizational security postures and privacy requirements. Since exploitation requires no authentication and can be performed remotely, the risk of data leakage is significant for any organization running affected versions of Uptime Kuma, especially those monitoring sensitive or critical infrastructure. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the public disclosure.

Mitigation Recommendations

Organizations using Uptime Kuma versions 2.0.0 to 2.1.3 should upgrade immediately to version 2.2.0 or later, where the authorization check on the /api/badge/:id/ping/:duration? endpoint is properly enforced. Until upgrading is possible, administrators should consider restricting network access to the Uptime Kuma server to trusted internal networks only, preventing unauthenticated external access to the API endpoints. Additionally, implementing web application firewalls (WAFs) with rules to detect and block suspicious API requests targeting badge endpoints can reduce exposure. Monitoring API logs for unusual access patterns to badge endpoints may help detect exploitation attempts. Reviewing and minimizing the number of private monitors exposed via badges and ensuring that sensitive monitoring data is not publicly accessible can further reduce risk. Finally, organizations should maintain an inventory of affected software versions and apply security patches promptly to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T14:47:05.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b30a4d2f860ef943dbc46d

Added to database: 3/12/2026, 6:47:41 PM

Last enriched: 3/20/2026, 2:34:54 AM

Last updated: 4/28/2026, 7:23:25 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses