Home

Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

PUBLISHED Reserved 2026-01-21 | Published 2026-01-22 | Updated 2026-01-22 | Assigner GitHub_M




LOW: 2.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')

CWE-209: Generation of Error Message Containing Sensitive Information

Product status

< 0.10.0
affected

References

github.com/...nraker/security/advisories/GHSA-3jqf-v4mv-747g

github.com/...ommit/74c5d8e44c4a4abbfbb06fb991e7ebb9ac947f42

cve.org (CVE-2026-24130)

nvd.nist.gov (CVE-2026-24130)

Download JSON