Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24130: CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Arksine moonraker

0
Low
VulnerabilityCVE-2026-24130cvecve-2026-24130cwe-90cwe-209
Published: Thu Jan 22 2026 (01/22/2026, 22:53:34 UTC)
Source: CVE Database V5
Vendor/Project: Arksine
Product: moonraker

Description

CVE-2026-24130 is an LDAP injection vulnerability in Arksine's Moonraker web server versions 0. 9. 3 and below when the ldap component is enabled. The flaw allows attackers to manipulate LDAP search filters via the login endpoint, enabling brute force discovery of LDAP entries such as user IDs and attributes by analyzing 401 error responses. This vulnerability does not require authentication or user interaction and has a low CVSS score of 2. 7. It was fixed in version 0. 10. 0. While exploitation does not lead to direct system compromise, it can leak sensitive directory information.

AI-Powered Analysis

AILast updated: 01/22/2026, 23:22:10 UTC

Technical Analysis

Moonraker is a Python-based web server that provides API access to Klipper 3D printer firmware. Versions 0.9.3 and earlier, when configured with the ldap component enabled, are vulnerable to LDAP injection attacks at the login endpoint. The vulnerability arises from improper neutralization of special characters in LDAP search filters (CWE-90), allowing an attacker to inject crafted input that alters the LDAP query logic. By analyzing the 401 Unauthorized error responses, an attacker can determine whether LDAP search queries succeed or fail, enabling brute force enumeration of LDAP entries such as user IDs and attributes. This information disclosure can aid in further attacks or reconnaissance. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The flaw was addressed in Moonraker version 0.10.0 by properly sanitizing LDAP query inputs. The CVSS 4.0 base score is 2.7, reflecting low severity due to limited impact on confidentiality and no direct integrity or availability compromise. No known exploits are currently in the wild. The vulnerability is related to CWE-90 (LDAP Injection) and CWE-209 (Information Exposure Through an Error Message).

Potential Impact

For European organizations using Moonraker versions prior to 0.10.0 with LDAP enabled, this vulnerability can lead to unauthorized disclosure of LDAP directory information, including user identifiers and attributes. While it does not allow direct system compromise or code execution, the leaked information can facilitate targeted attacks such as credential stuffing, social engineering, or privilege escalation attempts. Organizations relying on LDAP for authentication and user management in 3D printing environments may face increased risk of reconnaissance by threat actors. This is particularly relevant for industries with sensitive intellectual property or manufacturing processes controlled via Klipper firmware. The impact on confidentiality is limited but non-negligible, especially if combined with other vulnerabilities. Availability and integrity are not directly affected. The low CVSS score aligns with this assessment, but the risk increases if attackers chain this with other exploits.

Mitigation Recommendations

The primary mitigation is to upgrade Moonraker to version 0.10.0 or later, where the LDAP injection vulnerability is fixed. Until upgrade is possible, organizations should disable the ldap component if not strictly required. Network-level controls should restrict access to the Moonraker login endpoint to trusted IP addresses or VPN users to reduce exposure. Implementing Web Application Firewalls (WAFs) with rules to detect and block LDAP injection patterns can provide additional protection. Monitoring logs for unusual LDAP query patterns or repeated 401 responses can help detect exploitation attempts. Regularly auditing LDAP configurations and access controls will minimize the impact of any information disclosure. Finally, educating administrators about the risks of LDAP injection and proper input sanitization is recommended to prevent similar issues in custom integrations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-21T18:38:22.474Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6972ad5b4623b1157c962ba9

Added to database: 1/22/2026, 11:06:03 PM

Last enriched: 1/22/2026, 11:22:10 PM

Last updated: 1/23/2026, 3:27:01 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats