CVE-2025-48067: CWE-73: External Control of File Name or Path in OctoPrint OctoPrint
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.
AI Analysis
Technical Summary
CVE-2025-48067 is a medium severity vulnerability affecting OctoPrint, a widely used web interface for controlling consumer 3D printers. The vulnerability exists in OctoPrint versions up to and including 1.11.1 and is classified under CWE-73: External Control of File Name or Path. This flaw allows an attacker who has FILE_UPLOAD permissions to exfiltrate arbitrary files from the host system where OctoPrint is running. The attack works by moving files that OctoPrint can read into the upload folder, from which they can then be downloaded by the attacker. This effectively bypasses intended access controls and enables unauthorized disclosure of potentially sensitive files. The vulnerability does not require user interaction but does require the attacker to have authenticated access with FILE_UPLOAD privileges, which may be granted to legitimate users or compromised accounts. The vulnerability impacts confidentiality and availability, as it can lead to data leakage and potentially disrupt normal operations. The issue is fixed in OctoPrint version 1.11.2, and users are advised to upgrade to this or later versions to remediate the vulnerability. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation with low attack complexity make it a concern for environments using vulnerable versions of OctoPrint.
Potential Impact
For European organizations using OctoPrint to manage 3D printing operations, this vulnerability poses a risk of sensitive data exposure. Since OctoPrint is often used in manufacturing, prototyping, and research environments, unauthorized access to files could lead to intellectual property theft, leakage of proprietary designs, or exposure of configuration and credential files. The ability to exfiltrate files could also facilitate further attacks by revealing system details or credentials. Additionally, disruption of 3D printing workflows could impact production timelines and operational efficiency. Organizations in sectors such as automotive, aerospace, healthcare, and education—where 3D printing is increasingly integrated—may face reputational damage and financial losses if exploited. The requirement for FILE_UPLOAD permission means that insider threats or compromised user accounts pose a significant risk vector. Given the growing adoption of 3D printing in Europe, the vulnerability could affect a broad range of organizations, especially those with less mature cybersecurity practices or delayed patch management.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade OctoPrint installations to version 1.11.2 or later, where the issue is fixed. Beyond patching, organizations should audit and restrict FILE_UPLOAD permissions to only trusted users, minimizing the risk of exploitation by insiders or compromised accounts. Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), can reduce unauthorized access risks. Network segmentation should be employed to isolate 3D printer management interfaces from broader enterprise networks, limiting exposure. Monitoring and logging of file upload activities can help detect suspicious behavior indicative of exploitation attempts. Additionally, organizations should review and harden file system permissions to ensure OctoPrint has the minimum necessary read access, reducing the scope of files accessible for exfiltration. Regular security awareness training for users with upload permissions can also help prevent misuse. Finally, organizations should maintain an up-to-date inventory of 3D printing assets and incorporate them into vulnerability management programs to ensure timely updates and risk assessments.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Belgium, Spain, Poland, Finland
CVE-2025-48067: CWE-73: External Control of File Name or Path in OctoPrint OctoPrint
Description
OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-48067 is a medium severity vulnerability affecting OctoPrint, a widely used web interface for controlling consumer 3D printers. The vulnerability exists in OctoPrint versions up to and including 1.11.1 and is classified under CWE-73: External Control of File Name or Path. This flaw allows an attacker who has FILE_UPLOAD permissions to exfiltrate arbitrary files from the host system where OctoPrint is running. The attack works by moving files that OctoPrint can read into the upload folder, from which they can then be downloaded by the attacker. This effectively bypasses intended access controls and enables unauthorized disclosure of potentially sensitive files. The vulnerability does not require user interaction but does require the attacker to have authenticated access with FILE_UPLOAD privileges, which may be granted to legitimate users or compromised accounts. The vulnerability impacts confidentiality and availability, as it can lead to data leakage and potentially disrupt normal operations. The issue is fixed in OctoPrint version 1.11.2, and users are advised to upgrade to this or later versions to remediate the vulnerability. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation with low attack complexity make it a concern for environments using vulnerable versions of OctoPrint.
Potential Impact
For European organizations using OctoPrint to manage 3D printing operations, this vulnerability poses a risk of sensitive data exposure. Since OctoPrint is often used in manufacturing, prototyping, and research environments, unauthorized access to files could lead to intellectual property theft, leakage of proprietary designs, or exposure of configuration and credential files. The ability to exfiltrate files could also facilitate further attacks by revealing system details or credentials. Additionally, disruption of 3D printing workflows could impact production timelines and operational efficiency. Organizations in sectors such as automotive, aerospace, healthcare, and education—where 3D printing is increasingly integrated—may face reputational damage and financial losses if exploited. The requirement for FILE_UPLOAD permission means that insider threats or compromised user accounts pose a significant risk vector. Given the growing adoption of 3D printing in Europe, the vulnerability could affect a broad range of organizations, especially those with less mature cybersecurity practices or delayed patch management.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade OctoPrint installations to version 1.11.2 or later, where the issue is fixed. Beyond patching, organizations should audit and restrict FILE_UPLOAD permissions to only trusted users, minimizing the risk of exploitation by insiders or compromised accounts. Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), can reduce unauthorized access risks. Network segmentation should be employed to isolate 3D printer management interfaces from broader enterprise networks, limiting exposure. Monitoring and logging of file upload activities can help detect suspicious behavior indicative of exploitation attempts. Additionally, organizations should review and harden file system permissions to ensure OctoPrint has the minimum necessary read access, reducing the scope of files accessible for exfiltration. Regular security awareness training for users with upload permissions can also help prevent misuse. Finally, organizations should maintain an up-to-date inventory of 3D printing assets and incorporate them into vulnerability management programs to ensure timely updates and risk assessments.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-15T16:06:40.941Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f531b0bd07c39389fa1
Added to database: 6/10/2025, 6:54:11 PM
Last enriched: 7/11/2025, 9:47:08 PM
Last updated: 1/7/2026, 4:23:09 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.