Skip to main content

CVE-2022-2872: CWE-434 Unrestricted Upload of File with Dangerous Type in octoprint octoprint/octoprint

Low
VulnerabilityCVE-2022-2872cvecve-2022-2872cwe-434
Published: Wed Sep 21 2022 (09/21/2022, 09:55:08 UTC)
Source: CVE Database V5
Vendor/Project: octoprint
Product: octoprint/octoprint

Description

Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3.

AI-Powered Analysis

AILast updated: 07/07/2025, 08:28:04 UTC

Technical Analysis

CVE-2022-2872 is a vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the OctoPrint software, an open-source web interface used primarily for controlling 3D printers. The issue exists in versions prior to 1.8.3 of OctoPrint. The vulnerability allows an attacker with limited privileges (PR:L) and requiring user interaction (UI:R) to upload files that are potentially dangerous without sufficient validation or restriction on file types. The CVSS v3.0 score is 3.7, indicating a low severity level, with an attack vector of network (AV:N), high attack complexity (AC:H), and no impact on availability (A:N), but with low impact on confidentiality (C:L) and integrity (I:L). This suggests that while exploitation is possible remotely, it requires some conditions to be met, such as user interaction and limited privileges, and the impact on the system's confidentiality and integrity is limited. The vulnerability could allow an attacker to upload malicious files that might be executed or used to compromise the system or escalate privileges, depending on the deployment context and additional security controls in place. No known exploits are reported in the wild, and no official patches are linked in the provided information, but the issue is addressed in OctoPrint version 1.8.3 and later.

Potential Impact

For European organizations using OctoPrint to manage 3D printing operations, this vulnerability could lead to unauthorized file uploads that might compromise the integrity or confidentiality of the printing environment. Although the direct impact is low, attackers could leverage this vulnerability as part of a multi-stage attack to introduce malicious payloads or disrupt printing processes. In industrial or manufacturing contexts, this could result in production delays, intellectual property theft, or sabotage of printed components. Given the increasing adoption of 3D printing in sectors such as automotive, aerospace, healthcare, and research across Europe, even low-severity vulnerabilities can have outsized operational and reputational impacts if exploited. The requirement for user interaction and limited privileges reduces the likelihood of widespread exploitation but does not eliminate risk, especially in environments with less stringent user access controls or where social engineering could be employed.

Mitigation Recommendations

European organizations should upgrade OctoPrint installations to version 1.8.3 or later where this vulnerability is fixed. In addition, organizations should implement strict file upload controls, including whitelisting allowed file types and scanning uploaded files for malware. Network segmentation should be applied to isolate 3D printing infrastructure from critical production networks. User privileges should be minimized, ensuring that only trusted users have upload capabilities. Monitoring and logging of file upload activities should be enhanced to detect anomalous behavior. User training to recognize and avoid social engineering attempts that could trigger malicious uploads is also recommended. If upgrading is not immediately feasible, temporary mitigations such as disabling file uploads or restricting upload functionality to trusted users can reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-08-17T00:00:00.000Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68372bbe182aa0cae2520252

Added to database: 5/28/2025, 3:29:02 PM

Last enriched: 7/7/2025, 8:28:04 AM

Last updated: 7/28/2025, 9:54:38 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats