We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48067

OctoPrint vulnerable to possible file extraction via upload endpoints



Description

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.

Reserved 2025-05-15 | Published 2025-06-10 | Updated 2025-06-10 | Assigner GitHub_M


MEDIUM: 5.4CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L

Problem types

CWE-73: External Control of File Name or Path

Product status

< 1.11.2
affected

References

github.com/...oPrint/security/advisories/GHSA-m9jh-jf9h-x3h2

github.com/...ommit/9984b20773f5895a432f965b759999b16c57f7d8

cve.org (CVE-2025-48067)

nvd.nist.gov (CVE-2025-48067)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48067

Support options

Helpdesk Chat, Email, Knowledgebase