CVE-2025-48067: CWE-73: External Control of File Name or Path in OctoPrint OctoPrint
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.
AI Analysis
Technical Summary
CVE-2025-48067 is a medium severity vulnerability affecting OctoPrint, a widely used web interface for controlling consumer 3D printers. The vulnerability exists in OctoPrint versions up to and including 1.11.1 and is classified under CWE-73: External Control of File Name or Path. This flaw allows an attacker who has FILE_UPLOAD permissions to exfiltrate arbitrary files from the host system where OctoPrint is running. The attack works by moving files that OctoPrint can read into the upload folder, from which they can then be downloaded by the attacker. This effectively bypasses intended access controls and enables unauthorized disclosure of potentially sensitive files. The vulnerability does not require user interaction but does require the attacker to have authenticated access with FILE_UPLOAD privileges, which may be granted to legitimate users or compromised accounts. The vulnerability impacts confidentiality and availability, as it can lead to data leakage and potentially disrupt normal operations. The issue is fixed in OctoPrint version 1.11.2, and users are advised to upgrade to this or later versions to remediate the vulnerability. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation with low attack complexity make it a concern for environments using vulnerable versions of OctoPrint.
Potential Impact
For European organizations using OctoPrint to manage 3D printing operations, this vulnerability poses a risk of sensitive data exposure. Since OctoPrint is often used in manufacturing, prototyping, and research environments, unauthorized access to files could lead to intellectual property theft, leakage of proprietary designs, or exposure of configuration and credential files. The ability to exfiltrate files could also facilitate further attacks by revealing system details or credentials. Additionally, disruption of 3D printing workflows could impact production timelines and operational efficiency. Organizations in sectors such as automotive, aerospace, healthcare, and education—where 3D printing is increasingly integrated—may face reputational damage and financial losses if exploited. The requirement for FILE_UPLOAD permission means that insider threats or compromised user accounts pose a significant risk vector. Given the growing adoption of 3D printing in Europe, the vulnerability could affect a broad range of organizations, especially those with less mature cybersecurity practices or delayed patch management.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade OctoPrint installations to version 1.11.2 or later, where the issue is fixed. Beyond patching, organizations should audit and restrict FILE_UPLOAD permissions to only trusted users, minimizing the risk of exploitation by insiders or compromised accounts. Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), can reduce unauthorized access risks. Network segmentation should be employed to isolate 3D printer management interfaces from broader enterprise networks, limiting exposure. Monitoring and logging of file upload activities can help detect suspicious behavior indicative of exploitation attempts. Additionally, organizations should review and harden file system permissions to ensure OctoPrint has the minimum necessary read access, reducing the scope of files accessible for exfiltration. Regular security awareness training for users with upload permissions can also help prevent misuse. Finally, organizations should maintain an up-to-date inventory of 3D printing assets and incorporate them into vulnerability management programs to ensure timely updates and risk assessments.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Belgium, Spain, Poland, Finland
CVE-2025-48067: CWE-73: External Control of File Name or Path in OctoPrint OctoPrint
Description
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-48067 is a medium severity vulnerability affecting OctoPrint, a widely used web interface for controlling consumer 3D printers. The vulnerability exists in OctoPrint versions up to and including 1.11.1 and is classified under CWE-73: External Control of File Name or Path. This flaw allows an attacker who has FILE_UPLOAD permissions to exfiltrate arbitrary files from the host system where OctoPrint is running. The attack works by moving files that OctoPrint can read into the upload folder, from which they can then be downloaded by the attacker. This effectively bypasses intended access controls and enables unauthorized disclosure of potentially sensitive files. The vulnerability does not require user interaction but does require the attacker to have authenticated access with FILE_UPLOAD privileges, which may be granted to legitimate users or compromised accounts. The vulnerability impacts confidentiality and availability, as it can lead to data leakage and potentially disrupt normal operations. The issue is fixed in OctoPrint version 1.11.2, and users are advised to upgrade to this or later versions to remediate the vulnerability. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation with low attack complexity make it a concern for environments using vulnerable versions of OctoPrint.
Potential Impact
For European organizations using OctoPrint to manage 3D printing operations, this vulnerability poses a risk of sensitive data exposure. Since OctoPrint is often used in manufacturing, prototyping, and research environments, unauthorized access to files could lead to intellectual property theft, leakage of proprietary designs, or exposure of configuration and credential files. The ability to exfiltrate files could also facilitate further attacks by revealing system details or credentials. Additionally, disruption of 3D printing workflows could impact production timelines and operational efficiency. Organizations in sectors such as automotive, aerospace, healthcare, and education—where 3D printing is increasingly integrated—may face reputational damage and financial losses if exploited. The requirement for FILE_UPLOAD permission means that insider threats or compromised user accounts pose a significant risk vector. Given the growing adoption of 3D printing in Europe, the vulnerability could affect a broad range of organizations, especially those with less mature cybersecurity practices or delayed patch management.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade OctoPrint installations to version 1.11.2 or later, where the issue is fixed. Beyond patching, organizations should audit and restrict FILE_UPLOAD permissions to only trusted users, minimizing the risk of exploitation by insiders or compromised accounts. Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), can reduce unauthorized access risks. Network segmentation should be employed to isolate 3D printer management interfaces from broader enterprise networks, limiting exposure. Monitoring and logging of file upload activities can help detect suspicious behavior indicative of exploitation attempts. Additionally, organizations should review and harden file system permissions to ensure OctoPrint has the minimum necessary read access, reducing the scope of files accessible for exfiltration. Regular security awareness training for users with upload permissions can also help prevent misuse. Finally, organizations should maintain an up-to-date inventory of 3D printing assets and incorporate them into vulnerability management programs to ensure timely updates and risk assessments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-15T16:06:40.941Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f531b0bd07c39389fa1
Added to database: 6/10/2025, 6:54:11 PM
Last enriched: 7/11/2025, 9:47:08 PM
Last updated: 8/8/2025, 8:51:43 AM
Views: 13
Related Threats
CVE-2025-8960: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-8958: Stack-based Buffer Overflow in Tenda TX3
HighCVE-2025-8957: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-54707: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in RealMag777 MDTF
CriticalCVE-2025-54706: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Noor Alam Magical Posts Display
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.