Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32230: CWE-862: Missing Authorization in louislam uptime-kuma

0
Medium
VulnerabilityCVE-2026-32230cvecve-2026-32230cwe-862
Published: Thu Mar 12 2026 (03/12/2026, 18:13:58 UTC)
Source: CVE Database V5
Vendor/Project: louislam
Product: uptime-kuma

Description

CVE-2026-32230 is a medium severity vulnerability in Uptime Kuma versions 2. 0. 0 through 2. 1. 3, where the GET /api/badge/:id/ping/:duration? endpoint fails to verify authorization properly. This flaw allows unauthenticated users to access average ping and response time data for private monitors, bypassing intended access controls. The vulnerability arises because this specific endpoint does not check if the requested monitor belongs to a public group, unlike other badge endpoints. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The issue is fixed in version 2.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:48:35 UTC

Technical Analysis

Uptime Kuma is an open-source, self-hosted monitoring tool widely used for tracking uptime and response metrics of IT infrastructure. Versions 2.0.0 through 2.1.3 contain a missing authorization vulnerability (CWE-862) in the GET /api/badge/:id/ping/:duration? endpoint. Unlike other badge endpoints that enforce a SQL query condition to ensure the requested monitor is public (public=1), this ping endpoint omits this check entirely. Consequently, unauthenticated attackers can query this endpoint to retrieve average ping and response time data for private monitors that should be restricted. This leakage of monitoring data does not require authentication or user interaction and can be exploited remotely over the network. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level due to its limited impact on confidentiality and no impact on integrity or availability. The flaw was publicly disclosed and fixed in version 2.2.0 of Uptime Kuma. No known exploits are currently reported in the wild. The vulnerability could allow attackers to gather intelligence on private infrastructure performance and availability, potentially aiding further targeted attacks or reconnaissance.

Potential Impact

The primary impact of CVE-2026-32230 is unauthorized information disclosure of private monitoring data, specifically average ping and response times. This can reveal sensitive operational details about an organization's internal or private infrastructure, such as server responsiveness and uptime patterns. While this does not directly compromise system integrity or availability, the leaked data can be leveraged by attackers for reconnaissance to plan more sophisticated attacks. Organizations relying on Uptime Kuma for monitoring critical infrastructure may inadvertently expose private performance metrics, potentially undermining security posture and privacy. The vulnerability affects all organizations using vulnerable versions, especially those with sensitive or critical infrastructure monitored privately. Since exploitation requires no authentication and no user interaction, the risk of automated scanning and data harvesting is elevated. However, the lack of known active exploitation reduces immediate threat urgency. Prompt patching is essential to prevent potential intelligence gathering by malicious actors.

Mitigation Recommendations

1. Upgrade Uptime Kuma to version 2.2.0 or later, where the authorization check for the ping badge endpoint is properly enforced. 2. If immediate upgrade is not feasible, implement network-level access controls to restrict access to the Uptime Kuma API endpoints, especially the /api/badge/:id/ping/:duration? endpoint, limiting it to trusted IP addresses or VPN users. 3. Review and audit existing monitor configurations to ensure sensitive monitors are not publicly accessible or exposed inadvertently. 4. Monitor logs for unusual or repeated access attempts to badge endpoints from unauthenticated sources, which may indicate reconnaissance activity. 5. Consider deploying web application firewalls (WAF) with custom rules to detect and block unauthorized access to sensitive API endpoints. 6. Educate administrators about the importance of timely patching and secure configuration of monitoring tools to prevent information leakage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T14:47:05.681Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b30a4d2f860ef943dbc46d

Added to database: 3/12/2026, 6:47:41 PM

Last enriched: 3/12/2026, 6:48:35 PM

Last updated: 3/13/2026, 9:54:07 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses