CVE-2026-33143
Received Received - Intake
Unauthenticated Webhook Forgery in OneUptime WhatsApp Handler

Publication date: 2026-03-20

Last updated on: 2026-03-23

Assigner: GitHub, Inc.

Description
OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature, allowing any unauthenticated attacker to send forged webhook payloads that manipulate notification delivery status records, suppress alerts, and corrupt audit trails. The codebase already implements proper signature verification for Slack webhooks. This issue has been patched in version 10.0.34.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-20
Last Modified
2026-03-23
Generated
2026-05-06
AI Q&A
2026-03-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hackerbay oneuptime to 10.0.34 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-33143 is a vulnerability in the OneUptime npm package prior to version 10.0.34, specifically in its WhatsApp POST webhook handler at the endpoint /notification/whatsapp/webhook.'}, {'type': 'paragraph', 'content': 'The issue is that this handler processes incoming WhatsApp status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature, which is supposed to confirm the authenticity of the payload.'}, {'type': 'paragraph', 'content': 'Because the signature verification is missing, any unauthenticated attacker can send forged webhook payloads. These forged payloads can manipulate notification delivery status records, suppress alerts, and corrupt audit trails.'}, {'type': 'paragraph', 'content': 'While the handler does check that the "object" field in the JSON body equals "whatsapp_business_account", this check is insufficient for security. The vulnerability was fixed in version 10.0.34 by adding proper signature verification.'}] [1]


How can this vulnerability impact me? :

This vulnerability allows an attacker to send forged WhatsApp webhook payloads without authentication.

  • Manipulation of notification delivery status records, potentially causing false information about message delivery.
  • Suppression of alerts, which could lead to missed critical notifications.
  • Corruption of audit trails, undermining the integrity and reliability of logs used for monitoring and forensic analysis.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring network traffic for POST requests sent to the endpoint /notification/whatsapp/webhook that lack a valid X-Hub-Signature-256 header or contain forged payloads. Since the vulnerable handler does not verify the HMAC signature, any unauthenticated POST requests to this endpoint with WhatsApp status update events could indicate exploitation attempts.'}, {'type': 'paragraph', 'content': 'A practical approach is to capture and inspect HTTP POST requests to the vulnerable endpoint and check for the presence and validity of the X-Hub-Signature-256 header.'}, {'type': 'list_item', 'content': 'Use tools like tcpdump or Wireshark to capture HTTP traffic on the server hosting OneUptime, filtering for POST requests to /notification/whatsapp/webhook.'}, {'type': 'list_item', 'content': "Example tcpdump command: sudo tcpdump -A -s 0 'tcp port 80 or tcp port 443' | grep --after-context=20 '/notification/whatsapp/webhook'"}, {'type': 'list_item', 'content': 'Use curl or similar tools to test the endpoint by sending POST requests without the X-Hub-Signature-256 header or with an invalid signature to see if the server accepts them.'}, {'type': 'list_item', 'content': 'Example curl command to test the vulnerability: curl -X POST https://your-oneuptime-server/notification/whatsapp/webhook -H \'Content-Type: application/json\' -d \'{"object":"whatsapp_business_account","entry":[]}\''}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate and most effective mitigation is to upgrade the OneUptime package to version 10.0.34 or later, where the vulnerability has been patched by implementing proper verification of the X-Hub-Signature-256 HMAC signature in the WhatsApp POST webhook handler.

Until the upgrade can be applied, consider implementing network-level controls such as restricting access to the /notification/whatsapp/webhook endpoint to trusted IP addresses or internal networks only.

Additionally, monitor logs for suspicious POST requests to the vulnerable endpoint and alert on any unauthorized or malformed webhook payloads.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart