CVE-2026-33143
Unauthenticated Webhook Forgery in OneUptime WhatsApp Handler
Publication date: 2026-03-20
Last updated on: 2026-03-23
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hackerbay | oneuptime | to 10.0.34 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-345 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-33143 is a vulnerability in the OneUptime npm package prior to version 10.0.34, specifically in its WhatsApp POST webhook handler at the endpoint /notification/whatsapp/webhook.'}, {'type': 'paragraph', 'content': 'The issue is that this handler processes incoming WhatsApp status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature, which is supposed to confirm the authenticity of the payload.'}, {'type': 'paragraph', 'content': 'Because the signature verification is missing, any unauthenticated attacker can send forged webhook payloads. These forged payloads can manipulate notification delivery status records, suppress alerts, and corrupt audit trails.'}, {'type': 'paragraph', 'content': 'While the handler does check that the "object" field in the JSON body equals "whatsapp_business_account", this check is insufficient for security. The vulnerability was fixed in version 10.0.34 by adding proper signature verification.'}] [1]
How can this vulnerability impact me? :
This vulnerability allows an attacker to send forged WhatsApp webhook payloads without authentication.
- Manipulation of notification delivery status records, potentially causing false information about message delivery.
- Suppression of alerts, which could lead to missed critical notifications.
- Corruption of audit trails, undermining the integrity and reliability of logs used for monitoring and forensic analysis.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring network traffic for POST requests sent to the endpoint /notification/whatsapp/webhook that lack a valid X-Hub-Signature-256 header or contain forged payloads. Since the vulnerable handler does not verify the HMAC signature, any unauthenticated POST requests to this endpoint with WhatsApp status update events could indicate exploitation attempts.'}, {'type': 'paragraph', 'content': 'A practical approach is to capture and inspect HTTP POST requests to the vulnerable endpoint and check for the presence and validity of the X-Hub-Signature-256 header.'}, {'type': 'list_item', 'content': 'Use tools like tcpdump or Wireshark to capture HTTP traffic on the server hosting OneUptime, filtering for POST requests to /notification/whatsapp/webhook.'}, {'type': 'list_item', 'content': "Example tcpdump command: sudo tcpdump -A -s 0 'tcp port 80 or tcp port 443' | grep --after-context=20 '/notification/whatsapp/webhook'"}, {'type': 'list_item', 'content': 'Use curl or similar tools to test the endpoint by sending POST requests without the X-Hub-Signature-256 header or with an invalid signature to see if the server accepts them.'}, {'type': 'list_item', 'content': 'Example curl command to test the vulnerability: curl -X POST https://your-oneuptime-server/notification/whatsapp/webhook -H \'Content-Type: application/json\' -d \'{"object":"whatsapp_business_account","entry":[]}\''}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate and most effective mitigation is to upgrade the OneUptime package to version 10.0.34 or later, where the vulnerability has been patched by implementing proper verification of the X-Hub-Signature-256 HMAC signature in the WhatsApp POST webhook handler.
Until the upgrade can be applied, consider implementing network-level controls such as restricting access to the /notification/whatsapp/webhook endpoint to trusted IP addresses or internal networks only.
Additionally, monitor logs for suspicious POST requests to the vulnerable endpoint and alert on any unauthorized or malformed webhook payloads.