Description
An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server. Update: This CVE has been updated in May 2025 to update the fixed version and fix process. Please refer to the May 2025 Security Bulletin. Note: This CVE has been split from CVE-2024-3037.
Problem types
CWE-59 Improper Link Resolution Before File Access ('Link Following')
Product status
Any version before 24.1.7
Credits
Amol Dosanjh of Trend Micro
Nicholas Zubrisky (@NZubrisky) of Trend Micro
Michael DePlante (@izobashi) of Trend Micro's ZDI
References
www.papercut.com/kb/Main/Security-Bulletin-May-2025/
www.papercut.com/kb/Main/Security-Bulletin-May-2024/