Home

Description

An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server. Update: This CVE has been updated in May 2025 to update the fixed version and fix process. Please refer to the May 2025 Security Bulletin. Note: This CVE has been split from CVE-2024-3037.

PUBLISHED Reserved 2024-09-04 | Published 2024-09-26 | Updated 2025-05-13 | Assigner PaperCut




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-59 Improper Link Resolution Before File Access ('Link Following')

Product status

Default status
unaffected

Any version before 24.1.7
affected

Credits

Amol Dosanjh of Trend Micro finder

Nicholas Zubrisky (@NZubrisky) of Trend Micro finder

Michael DePlante (@izobashi) of Trend Micro's ZDI finder

References

www.papercut.com/kb/Main/Security-Bulletin-May-2025/

www.papercut.com/kb/Main/Security-Bulletin-May-2024/

cve.org (CVE-2024-8404)

nvd.nist.gov (CVE-2024-8404)

Download JSON