We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up to and including 1.10.3, OctoPrint has a vulnerability that allows an attacker to bypass the login redirect and directly access the rendered HTML of certain frontend pages. The primary risk lies in potential future modifications to the codebase that might incorrectly rely on the vulnerable internal functions for authentication checks, leading to security vulnerabilities. This issue has been patched in version 1.11.0.
Reserved 2025-04-10 | Published 2025-04-22 | Updated 2025-04-25 | Assigner GitHub_MCWE-290: Authentication Bypass by Spoofing
github.com/...oPrint/security/advisories/GHSA-qw93-h6pf-226x
github.com/...ommit/41ff431014edfa18ca1a01897b10463934dc7fc2
Support options