Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-58180

Опубликовано: 09 сент. 2025
Источник: nvd
CVSS3: 8.8
EPSS Низкий

Описание

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.2 contain a vulnerability that allows an authenticated attacker to upload a file under a specially crafted filename that will allow arbitrary command execution if said filename becomes included in a command defined in a system event handler and said event gets triggered. If no event handlers executing system commands with uploaded filenames as parameters have been configured, this vulnerability does not have an impact. The vulnerability is patched in version 1.11.3. As a workaround, OctoPrint administrators who have event handlers configured that include any kind of filename based placeholders should disable those by setting their enabled property to False or unchecking the "Enabled" checkbox in the GUI based Event Manager. Alternatively, OctoPrint administrators should set feature.enforceReallyUniversalFilenames to true in config.yaml and restart OctoPrint,

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*
Версия до 1.11.3 (исключая)

EPSS

Процентиль: 76%
0.00921
Низкий

8.8 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8.8
debian
5 месяцев назад

OctoPrint provides a web interface for controlling consumer 3D printer ...

CVSS3: 8.8
github
5 месяцев назад

OctoPrint is Vulnerable to RCE Attacks via Unsanitized Filename in File Upload

EPSS

Процентиль: 76%
0.00921
Низкий

8.8 High

CVSS3

Дефекты

CWE-78