CVE-2026-24130: CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Arksine moonraker
CVE-2026-24130 is an LDAP injection vulnerability in Arksine's Moonraker Python web server versions 0. 9. 3 and below when the ldap component is enabled. The flaw allows attackers to manipulate LDAP search filters via the login endpoint, exploiting error messages to enumerate LDAP entries such as user IDs and attributes. This vulnerability does not require authentication or user interaction and has a low CVSS score of 2. 7, indicating limited impact. The issue was fixed in version 0. 10. 0. While no known exploits are reported in the wild, affected instances could leak sensitive directory information, potentially aiding further attacks.
AI Analysis
Technical Summary
Moonraker is a Python-based web server that provides API access to Klipper 3D printing firmware. Versions 0.9.3 and earlier, when configured with the ldap component enabled, are vulnerable to LDAP injection (CWE-90) via the login endpoint. This vulnerability arises from improper neutralization of special elements in LDAP search filters, allowing an attacker to inject crafted input that manipulates the LDAP query logic. The server's 401 error responses reveal whether LDAP searches succeed or fail, enabling attackers to perform brute force enumeration of LDAP directory entries, including user IDs and attributes. This information disclosure can facilitate further attacks such as credential harvesting or privilege escalation. The vulnerability does not require authentication or user interaction and affects confidentiality primarily. It has a CVSS 4.0 base score of 2.7, reflecting low severity due to limited impact and no direct code execution or privilege escalation. The issue was addressed in Moonraker version 0.10.0 by properly sanitizing LDAP inputs and improving error handling to prevent information leakage. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of LDAP directory information, which may include user identities and attributes critical for authentication and authorization processes. Such information leakage can aid attackers in crafting targeted phishing campaigns, brute force attacks, or lateral movement within networks. While the direct impact on system availability or integrity is low, the confidentiality breach could undermine trust and compliance with data protection regulations such as GDPR. Organizations relying on Moonraker for managing 3D printing infrastructure, especially those integrating LDAP for authentication, risk exposure of sensitive user data. This could be particularly concerning in sectors with high security requirements like manufacturing, research, and healthcare. The vulnerability's ease of exploitation without authentication increases its risk profile, although the overall severity remains low due to the limited scope of impact and absence of known active exploitation.
Mitigation Recommendations
European organizations should immediately upgrade Moonraker instances to version 0.10.0 or later, where the LDAP injection vulnerability has been fixed. If upgrading is not immediately feasible, disable the ldap component to eliminate exposure. Restrict network access to the Moonraker login endpoint using firewalls or VPNs to limit potential attackers. Implement robust input validation and sanitization on all LDAP-related inputs beyond the vendor patch. Monitor logs for unusual LDAP query patterns or repeated 401 responses indicative of brute force enumeration attempts. Employ network segmentation to isolate 3D printing infrastructure from critical enterprise systems. Conduct regular security assessments of Moonraker deployments and related authentication mechanisms. Finally, educate administrators about the risks of LDAP injection and the importance of timely patching.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden
CVE-2026-24130: CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Arksine moonraker
Description
CVE-2026-24130 is an LDAP injection vulnerability in Arksine's Moonraker Python web server versions 0. 9. 3 and below when the ldap component is enabled. The flaw allows attackers to manipulate LDAP search filters via the login endpoint, exploiting error messages to enumerate LDAP entries such as user IDs and attributes. This vulnerability does not require authentication or user interaction and has a low CVSS score of 2. 7, indicating limited impact. The issue was fixed in version 0. 10. 0. While no known exploits are reported in the wild, affected instances could leak sensitive directory information, potentially aiding further attacks.
AI-Powered Analysis
Technical Analysis
Moonraker is a Python-based web server that provides API access to Klipper 3D printing firmware. Versions 0.9.3 and earlier, when configured with the ldap component enabled, are vulnerable to LDAP injection (CWE-90) via the login endpoint. This vulnerability arises from improper neutralization of special elements in LDAP search filters, allowing an attacker to inject crafted input that manipulates the LDAP query logic. The server's 401 error responses reveal whether LDAP searches succeed or fail, enabling attackers to perform brute force enumeration of LDAP directory entries, including user IDs and attributes. This information disclosure can facilitate further attacks such as credential harvesting or privilege escalation. The vulnerability does not require authentication or user interaction and affects confidentiality primarily. It has a CVSS 4.0 base score of 2.7, reflecting low severity due to limited impact and no direct code execution or privilege escalation. The issue was addressed in Moonraker version 0.10.0 by properly sanitizing LDAP inputs and improving error handling to prevent information leakage. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of LDAP directory information, which may include user identities and attributes critical for authentication and authorization processes. Such information leakage can aid attackers in crafting targeted phishing campaigns, brute force attacks, or lateral movement within networks. While the direct impact on system availability or integrity is low, the confidentiality breach could undermine trust and compliance with data protection regulations such as GDPR. Organizations relying on Moonraker for managing 3D printing infrastructure, especially those integrating LDAP for authentication, risk exposure of sensitive user data. This could be particularly concerning in sectors with high security requirements like manufacturing, research, and healthcare. The vulnerability's ease of exploitation without authentication increases its risk profile, although the overall severity remains low due to the limited scope of impact and absence of known active exploitation.
Mitigation Recommendations
European organizations should immediately upgrade Moonraker instances to version 0.10.0 or later, where the LDAP injection vulnerability has been fixed. If upgrading is not immediately feasible, disable the ldap component to eliminate exposure. Restrict network access to the Moonraker login endpoint using firewalls or VPNs to limit potential attackers. Implement robust input validation and sanitization on all LDAP-related inputs beyond the vendor patch. Monitor logs for unusual LDAP query patterns or repeated 401 responses indicative of brute force enumeration attempts. Employ network segmentation to isolate 3D printing infrastructure from critical enterprise systems. Conduct regular security assessments of Moonraker deployments and related authentication mechanisms. Finally, educate administrators about the risks of LDAP injection and the importance of timely patching.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-21T18:38:22.474Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6972ad5b4623b1157c962ba9
Added to database: 1/22/2026, 11:06:03 PM
Last enriched: 1/30/2026, 10:02:49 AM
Last updated: 2/5/2026, 5:29:49 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0715: CWE-522: Insufficiently Protected Credentials in Moxa UC-1200A Series
HighCVE-2026-0714: CWE-319: Cleartext Transmission of Sensitive Information in Moxa UC-1200A Series
HighCVE-2025-70792: n/a
UnknownCVE-2025-70791: n/a
UnknownCVE-2025-69906: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.