CVE-2025-62169: CWE-287: Improper Authentication in WildRikku OctoPrint-SpoolManager
OctoPrint-SpoolManager is a plugin for managing spools and all their usage metadata. In versions 1.8.0a2 and older of the testing branch and versions 1.7.7 and older of the stable branch, the APIs of the OctoPrint-SpoolManager plugin do not correctly enforce authentication or authorization checks. This issue has been patched in versions 1.8.0a3 of the testing branch and 1.7.8 of the stable branch. The impact of this vulnerability is greatly reduced when using OctoPrint version 1.11.2 and newer.
AI Analysis
Technical Summary
The OctoPrint-SpoolManager plugin, developed by WildRikku, is designed to manage 3D printing filament spools and their usage metadata within the OctoPrint ecosystem. Versions 1.8.0a2 and older in the testing branch, and 1.7.7 and older in the stable branch, suffer from an improper authentication vulnerability (CWE-287). Specifically, the plugin's APIs do not correctly enforce authentication or authorization, allowing unauthenticated remote attackers to access and manipulate spool data without restriction. This could lead to unauthorized disclosure of sensitive spool usage information, unauthorized modification or deletion of spool records, and potential disruption of 3D printing workflows. The vulnerability has been addressed in versions 1.8.0a3 (testing) and 1.7.8 (stable). Additionally, the impact is significantly reduced when the plugin is used with OctoPrint version 1.11.2 or later, which likely includes enhanced security controls. The CVSS v3.1 base score is 8.1, indicating a high severity due to network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make timely patching essential.
Potential Impact
For European organizations utilizing OctoPrint with the SpoolManager plugin, this vulnerability poses a significant risk to the confidentiality and integrity of 3D printing spool data, which may include proprietary or sensitive manufacturing information. Unauthorized access could allow attackers to disrupt production workflows by altering or deleting spool metadata, potentially causing downtime or defective prints. In sectors such as manufacturing, research, and prototyping—where 3D printing is integral—this could lead to operational delays and financial losses. Moreover, compromised spool data might expose intellectual property or usage patterns, increasing the risk of industrial espionage. The vulnerability's network accessibility and lack of required authentication amplify the threat, especially in environments where OctoPrint instances are exposed or insufficiently segmented. However, organizations running OctoPrint 1.11.2 or newer will experience reduced impact due to improved security measures in the core platform.
Mitigation Recommendations
European organizations should immediately verify their OctoPrint-SpoolManager plugin version and upgrade to at least 1.7.8 (stable) or 1.8.0a3 (testing) to remediate the vulnerability. Additionally, upgrading the OctoPrint core to version 1.11.2 or newer is strongly recommended to benefit from enhanced security controls that mitigate the impact. Network segmentation should be enforced to restrict access to OctoPrint instances, limiting exposure to trusted internal networks only. Implementing strong firewall rules and VPN access for remote connections can further reduce attack surface. Regularly audit and monitor API access logs for unusual activity indicative of exploitation attempts. Disable or uninstall the SpoolManager plugin if it is not essential to operations. Finally, maintain an up-to-date inventory of all 3D printing infrastructure components and apply security patches promptly to minimize exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Sweden, Finland
CVE-2025-62169: CWE-287: Improper Authentication in WildRikku OctoPrint-SpoolManager
Description
OctoPrint-SpoolManager is a plugin for managing spools and all their usage metadata. In versions 1.8.0a2 and older of the testing branch and versions 1.7.7 and older of the stable branch, the APIs of the OctoPrint-SpoolManager plugin do not correctly enforce authentication or authorization checks. This issue has been patched in versions 1.8.0a3 of the testing branch and 1.7.8 of the stable branch. The impact of this vulnerability is greatly reduced when using OctoPrint version 1.11.2 and newer.
AI-Powered Analysis
Technical Analysis
The OctoPrint-SpoolManager plugin, developed by WildRikku, is designed to manage 3D printing filament spools and their usage metadata within the OctoPrint ecosystem. Versions 1.8.0a2 and older in the testing branch, and 1.7.7 and older in the stable branch, suffer from an improper authentication vulnerability (CWE-287). Specifically, the plugin's APIs do not correctly enforce authentication or authorization, allowing unauthenticated remote attackers to access and manipulate spool data without restriction. This could lead to unauthorized disclosure of sensitive spool usage information, unauthorized modification or deletion of spool records, and potential disruption of 3D printing workflows. The vulnerability has been addressed in versions 1.8.0a3 (testing) and 1.7.8 (stable). Additionally, the impact is significantly reduced when the plugin is used with OctoPrint version 1.11.2 or later, which likely includes enhanced security controls. The CVSS v3.1 base score is 8.1, indicating a high severity due to network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make timely patching essential.
Potential Impact
For European organizations utilizing OctoPrint with the SpoolManager plugin, this vulnerability poses a significant risk to the confidentiality and integrity of 3D printing spool data, which may include proprietary or sensitive manufacturing information. Unauthorized access could allow attackers to disrupt production workflows by altering or deleting spool metadata, potentially causing downtime or defective prints. In sectors such as manufacturing, research, and prototyping—where 3D printing is integral—this could lead to operational delays and financial losses. Moreover, compromised spool data might expose intellectual property or usage patterns, increasing the risk of industrial espionage. The vulnerability's network accessibility and lack of required authentication amplify the threat, especially in environments where OctoPrint instances are exposed or insufficiently segmented. However, organizations running OctoPrint 1.11.2 or newer will experience reduced impact due to improved security measures in the core platform.
Mitigation Recommendations
European organizations should immediately verify their OctoPrint-SpoolManager plugin version and upgrade to at least 1.7.8 (stable) or 1.8.0a3 (testing) to remediate the vulnerability. Additionally, upgrading the OctoPrint core to version 1.11.2 or newer is strongly recommended to benefit from enhanced security controls that mitigate the impact. Network segmentation should be enforced to restrict access to OctoPrint instances, limiting exposure to trusted internal networks only. Implementing strong firewall rules and VPN access for remote connections can further reduce attack surface. Regularly audit and monitor API access logs for unusual activity indicative of exploitation attempts. Disable or uninstall the SpoolManager plugin if it is not essential to operations. Finally, maintain an up-to-date inventory of all 3D printing infrastructure components and apply security patches promptly to minimize exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-07T16:12:03.425Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fa55172f85fa8bca58f7d0
Added to database: 10/23/2025, 4:17:27 PM
Last enriched: 10/23/2025, 4:17:41 PM
Last updated: 10/23/2025, 8:17:43 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54966: n/a
UnknownCVE-2025-54964: n/a
UnknownCVE-2025-58428: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Veeder-Root TLS4B Automatic Tank Gauge System
CriticalCVE-2025-62236: CWE-204 Observable Response Discrepancy in Frontier Airlines flyfrontier.com
MediumCVE-2025-55067: CWE-190 Integer Overflow or Wraparound in Veeder-Root TLS4B Automatic Tank Gauge System
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.