Логотип exploitDog
bind:CVE-2025-58180
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-58180

Количество 3

Количество 3

nvd логотип

CVE-2025-58180

5 месяцев назад

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.2 contain a vulnerability that allows an authenticated attacker to upload a file under a specially crafted filename that will allow arbitrary command execution if said filename becomes included in a command defined in a system event handler and said event gets triggered. If no event handlers executing system commands with uploaded filenames as parameters have been configured, this vulnerability does not have an impact. The vulnerability is patched in version 1.11.3. As a workaround, OctoPrint administrators who have event handlers configured that include any kind of filename based placeholders should disable those by setting their `enabled` property to `False` or unchecking the "Enabled" checkbox in the GUI based Event Manager. Alternatively, OctoPrint administrators should set `feature.enforceReallyUniversalFilenames` to `true` in `config.yaml` and restart OctoPrint,

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2025-58180

5 месяцев назад

OctoPrint provides a web interface for controlling consumer 3D printer ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-49mj-x8jp-qvfc

5 месяцев назад

OctoPrint is Vulnerable to RCE Attacks via Unsanitized Filename in File Upload

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-58180

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.2 contain a vulnerability that allows an authenticated attacker to upload a file under a specially crafted filename that will allow arbitrary command execution if said filename becomes included in a command defined in a system event handler and said event gets triggered. If no event handlers executing system commands with uploaded filenames as parameters have been configured, this vulnerability does not have an impact. The vulnerability is patched in version 1.11.3. As a workaround, OctoPrint administrators who have event handlers configured that include any kind of filename based placeholders should disable those by setting their `enabled` property to `False` or unchecking the "Enabled" checkbox in the GUI based Event Manager. Alternatively, OctoPrint administrators should set `feature.enforceReallyUniversalFilenames` to `true` in `config.yaml` and restart OctoPrint,

CVSS3: 8.8
1%
Низкий
5 месяцев назад
debian логотип
CVE-2025-58180

OctoPrint provides a web interface for controlling consumer 3D printer ...

CVSS3: 8.8
1%
Низкий
5 месяцев назад
github логотип
GHSA-49mj-x8jp-qvfc

OctoPrint is Vulnerable to RCE Attacks via Unsanitized Filename in File Upload

CVSS3: 8.8
1%
Низкий
5 месяцев назад

Уязвимостей на страницу