PYSEC-2025-56
Vulnerability from pysec - Published: 2025-04-22 18:15 - Updated: 2025-06-27 17:22
VLAI?
Details
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up to and including 1.10.3, OctoPrint has a vulnerability that allows an attacker to bypass the login redirect and directly access the rendered HTML of certain frontend pages. The primary risk lies in potential future modifications to the codebase that might incorrectly rely on the vulnerable internal functions for authentication checks, leading to security vulnerabilities. This issue has been patched in version 1.11.0.
Severity ?
4.3 (Medium)
Impacted products
| Name | purl | octoprint | pkg:pypi/octoprint |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "octoprint",
"purl": "pkg:pypi/octoprint"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "41ff431014edfa18ca1a01897b10463934dc7fc2"
}
],
"repo": "https://github.com/octoprint/octoprint",
"type": "GIT"
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.11.0"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"1.10.0",
"1.10.0rc1",
"1.10.0rc2",
"1.10.0rc3",
"1.10.0rc4",
"1.10.1",
"1.10.2",
"1.10.3",
"1.11.0rc1",
"1.11.0rc2",
"1.11.0rc3",
"1.11.0rc4",
"1.11.0rc5",
"1.11.0rc6",
"1.11.0rc7",
"1.3.11",
"1.3.12",
"1.3.12rc1",
"1.3.12rc3",
"1.4.0",
"1.4.0rc1",
"1.4.0rc2",
"1.4.0rc3",
"1.4.0rc4",
"1.4.0rc5",
"1.4.0rc6",
"1.4.1",
"1.4.1rc1",
"1.4.1rc2",
"1.4.1rc3",
"1.4.1rc4",
"1.4.2",
"1.5.0",
"1.5.0rc1",
"1.5.0rc2",
"1.5.0rc3",
"1.5.1",
"1.5.2",
"1.5.3",
"1.6.0",
"1.6.0rc1",
"1.6.0rc2",
"1.6.0rc3",
"1.6.1",
"1.7.0",
"1.7.0rc1",
"1.7.0rc2",
"1.7.0rc3",
"1.7.1",
"1.7.2",
"1.7.3",
"1.8.0",
"1.8.0rc1",
"1.8.0rc2",
"1.8.0rc3",
"1.8.0rc4",
"1.8.0rc5",
"1.8.1",
"1.8.2",
"1.8.3",
"1.8.4",
"1.8.5",
"1.8.6",
"1.8.7",
"1.9.0",
"1.9.0rc1",
"1.9.0rc2",
"1.9.0rc3",
"1.9.0rc4",
"1.9.0rc5",
"1.9.0rc6",
"1.9.1",
"1.9.2",
"1.9.3"
]
}
],
"aliases": [
"CVE-2025-32788",
"GHSA-qw93-h6pf-226x"
],
"details": "OctoPrint provides a web interface for controlling consumer 3D printers. In versions up to and including 1.10.3, OctoPrint has a vulnerability that allows an attacker to bypass the login redirect and directly access the rendered HTML of certain frontend pages. The primary risk lies in potential future modifications to the codebase that might incorrectly rely on the vulnerable internal functions for authentication checks, leading to security vulnerabilities. This issue has been patched in version 1.11.0.",
"id": "PYSEC-2025-56",
"modified": "2025-06-27T17:22:53.513680+00:00",
"published": "2025-04-22T18:15:59+00:00",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-qw93-h6pf-226x"
},
{
"type": "FIX",
"url": "https://github.com/OctoPrint/OctoPrint/commit/41ff431014edfa18ca1a01897b10463934dc7fc2"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…