Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24130: CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Arksine moonraker

0
Low
VulnerabilityCVE-2026-24130cvecve-2026-24130cwe-90cwe-209
Published: Thu Jan 22 2026 (01/22/2026, 22:53:34 UTC)
Source: CVE Database V5
Vendor/Project: Arksine
Product: moonraker

Description

CVE-2026-24130 is an LDAP injection vulnerability in Arksine's Moonraker Python web server versions 0. 9. 3 and below when the ldap component is enabled. The flaw allows attackers to manipulate LDAP search filters via the login endpoint, exploiting error messages to enumerate LDAP entries such as user IDs and attributes. This vulnerability does not require authentication or user interaction and has a low CVSS score of 2. 7, indicating limited impact. The issue was fixed in version 0. 10. 0. While no known exploits are reported in the wild, affected instances could leak sensitive directory information, potentially aiding further attacks.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:02:49 UTC

Technical Analysis

Moonraker is a Python-based web server that provides API access to Klipper 3D printing firmware. Versions 0.9.3 and earlier, when configured with the ldap component enabled, are vulnerable to LDAP injection (CWE-90) via the login endpoint. This vulnerability arises from improper neutralization of special elements in LDAP search filters, allowing an attacker to inject crafted input that manipulates the LDAP query logic. The server's 401 error responses reveal whether LDAP searches succeed or fail, enabling attackers to perform brute force enumeration of LDAP directory entries, including user IDs and attributes. This information disclosure can facilitate further attacks such as credential harvesting or privilege escalation. The vulnerability does not require authentication or user interaction and affects confidentiality primarily. It has a CVSS 4.0 base score of 2.7, reflecting low severity due to limited impact and no direct code execution or privilege escalation. The issue was addressed in Moonraker version 0.10.0 by properly sanitizing LDAP inputs and improving error handling to prevent information leakage. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of LDAP directory information, which may include user identities and attributes critical for authentication and authorization processes. Such information leakage can aid attackers in crafting targeted phishing campaigns, brute force attacks, or lateral movement within networks. While the direct impact on system availability or integrity is low, the confidentiality breach could undermine trust and compliance with data protection regulations such as GDPR. Organizations relying on Moonraker for managing 3D printing infrastructure, especially those integrating LDAP for authentication, risk exposure of sensitive user data. This could be particularly concerning in sectors with high security requirements like manufacturing, research, and healthcare. The vulnerability's ease of exploitation without authentication increases its risk profile, although the overall severity remains low due to the limited scope of impact and absence of known active exploitation.

Mitigation Recommendations

European organizations should immediately upgrade Moonraker instances to version 0.10.0 or later, where the LDAP injection vulnerability has been fixed. If upgrading is not immediately feasible, disable the ldap component to eliminate exposure. Restrict network access to the Moonraker login endpoint using firewalls or VPNs to limit potential attackers. Implement robust input validation and sanitization on all LDAP-related inputs beyond the vendor patch. Monitor logs for unusual LDAP query patterns or repeated 401 responses indicative of brute force enumeration attempts. Employ network segmentation to isolate 3D printing infrastructure from critical enterprise systems. Conduct regular security assessments of Moonraker deployments and related authentication mechanisms. Finally, educate administrators about the risks of LDAP injection and the importance of timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-21T18:38:22.474Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6972ad5b4623b1157c962ba9

Added to database: 1/22/2026, 11:06:03 PM

Last enriched: 1/30/2026, 10:02:49 AM

Last updated: 2/5/2026, 5:29:49 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats