Skip to main content

CVE-2025-48067: CWE-73: External Control of File Name or Path in OctoPrint OctoPrint

Medium
VulnerabilityCVE-2025-48067cvecve-2025-48067cwe-73
Published: Tue Jun 10 2025 (06/10/2025, 15:19:44 UTC)
Source: CVE Database V5
Vendor/Project: OctoPrint
Product: OctoPrint

Description

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.

AI-Powered Analysis

AILast updated: 07/11/2025, 21:47:08 UTC

Technical Analysis

CVE-2025-48067 is a medium severity vulnerability affecting OctoPrint, a widely used web interface for controlling consumer 3D printers. The vulnerability exists in OctoPrint versions up to and including 1.11.1 and is classified under CWE-73: External Control of File Name or Path. This flaw allows an attacker who has FILE_UPLOAD permissions to exfiltrate arbitrary files from the host system where OctoPrint is running. The attack works by moving files that OctoPrint can read into the upload folder, from which they can then be downloaded by the attacker. This effectively bypasses intended access controls and enables unauthorized disclosure of potentially sensitive files. The vulnerability does not require user interaction but does require the attacker to have authenticated access with FILE_UPLOAD privileges, which may be granted to legitimate users or compromised accounts. The vulnerability impacts confidentiality and availability, as it can lead to data leakage and potentially disrupt normal operations. The issue is fixed in OctoPrint version 1.11.2, and users are advised to upgrade to this or later versions to remediate the vulnerability. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation with low attack complexity make it a concern for environments using vulnerable versions of OctoPrint.

Potential Impact

For European organizations using OctoPrint to manage 3D printing operations, this vulnerability poses a risk of sensitive data exposure. Since OctoPrint is often used in manufacturing, prototyping, and research environments, unauthorized access to files could lead to intellectual property theft, leakage of proprietary designs, or exposure of configuration and credential files. The ability to exfiltrate files could also facilitate further attacks by revealing system details or credentials. Additionally, disruption of 3D printing workflows could impact production timelines and operational efficiency. Organizations in sectors such as automotive, aerospace, healthcare, and education—where 3D printing is increasingly integrated—may face reputational damage and financial losses if exploited. The requirement for FILE_UPLOAD permission means that insider threats or compromised user accounts pose a significant risk vector. Given the growing adoption of 3D printing in Europe, the vulnerability could affect a broad range of organizations, especially those with less mature cybersecurity practices or delayed patch management.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should promptly upgrade OctoPrint installations to version 1.11.2 or later, where the issue is fixed. Beyond patching, organizations should audit and restrict FILE_UPLOAD permissions to only trusted users, minimizing the risk of exploitation by insiders or compromised accounts. Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), can reduce unauthorized access risks. Network segmentation should be employed to isolate 3D printer management interfaces from broader enterprise networks, limiting exposure. Monitoring and logging of file upload activities can help detect suspicious behavior indicative of exploitation attempts. Additionally, organizations should review and harden file system permissions to ensure OctoPrint has the minimum necessary read access, reducing the scope of files accessible for exfiltration. Regular security awareness training for users with upload permissions can also help prevent misuse. Finally, organizations should maintain an up-to-date inventory of 3D printing assets and incorporate them into vulnerability management programs to ensure timely updates and risk assessments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-15T16:06:40.941Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f531b0bd07c39389fa1

Added to database: 6/10/2025, 6:54:11 PM

Last enriched: 7/11/2025, 9:47:08 PM

Last updated: 8/8/2025, 8:51:43 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats