OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.
References
Configurations
History
12 Aug 2025, 13:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
First Time |
Octoprint
Octoprint octoprint |
|
References | () https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-m9jh-jf9h-x3h2 - Vendor Advisory | |
References | () https://github.com/OctoPrint/OctoPrint/commit/9984b20773f5895a432f965b759999b16c57f7d8 - Patch |
10 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-10 16:15
Updated : 2025-08-12 13:44
NVD link : CVE-2025-48067
Mitre link : CVE-2025-48067
JSON object : View
Products Affected
octoprint
- octoprint
CWE
CWE-73
External Control of File Name or Path