CVE-2026-24130: CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Arksine moonraker
CVE-2026-24130 is an LDAP injection vulnerability in Arksine's Moonraker web server versions 0. 9. 3 and below when the ldap component is enabled. The flaw allows attackers to manipulate LDAP search filters via the login endpoint, enabling brute force discovery of LDAP entries such as user IDs and attributes by analyzing 401 error responses. This vulnerability does not require authentication or user interaction and has a low CVSS score of 2. 7. It was fixed in version 0. 10. 0. While exploitation does not lead to direct system compromise, it can leak sensitive directory information.
AI Analysis
Technical Summary
Moonraker is a Python-based web server that provides API access to Klipper 3D printer firmware. Versions 0.9.3 and earlier, when configured with the ldap component enabled, are vulnerable to LDAP injection attacks at the login endpoint. The vulnerability arises from improper neutralization of special characters in LDAP search filters (CWE-90), allowing an attacker to inject crafted input that alters the LDAP query logic. By analyzing the 401 Unauthorized error responses, an attacker can determine whether LDAP search queries succeed or fail, enabling brute force enumeration of LDAP entries such as user IDs and attributes. This information disclosure can aid in further attacks or reconnaissance. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The flaw was addressed in Moonraker version 0.10.0 by properly sanitizing LDAP query inputs. The CVSS 4.0 base score is 2.7, reflecting low severity due to limited impact on confidentiality and no direct integrity or availability compromise. No known exploits are currently in the wild. The vulnerability is related to CWE-90 (LDAP Injection) and CWE-209 (Information Exposure Through an Error Message).
Potential Impact
For European organizations using Moonraker versions prior to 0.10.0 with LDAP enabled, this vulnerability can lead to unauthorized disclosure of LDAP directory information, including user identifiers and attributes. While it does not allow direct system compromise or code execution, the leaked information can facilitate targeted attacks such as credential stuffing, social engineering, or privilege escalation attempts. Organizations relying on LDAP for authentication and user management in 3D printing environments may face increased risk of reconnaissance by threat actors. This is particularly relevant for industries with sensitive intellectual property or manufacturing processes controlled via Klipper firmware. The impact on confidentiality is limited but non-negligible, especially if combined with other vulnerabilities. Availability and integrity are not directly affected. The low CVSS score aligns with this assessment, but the risk increases if attackers chain this with other exploits.
Mitigation Recommendations
The primary mitigation is to upgrade Moonraker to version 0.10.0 or later, where the LDAP injection vulnerability is fixed. Until upgrade is possible, organizations should disable the ldap component if not strictly required. Network-level controls should restrict access to the Moonraker login endpoint to trusted IP addresses or VPN users to reduce exposure. Implementing Web Application Firewalls (WAFs) with rules to detect and block LDAP injection patterns can provide additional protection. Monitoring logs for unusual LDAP query patterns or repeated 401 responses can help detect exploitation attempts. Regularly auditing LDAP configurations and access controls will minimize the impact of any information disclosure. Finally, educating administrators about the risks of LDAP injection and proper input sanitization is recommended to prevent similar issues in custom integrations.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Poland, Sweden
CVE-2026-24130: CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Arksine moonraker
Description
CVE-2026-24130 is an LDAP injection vulnerability in Arksine's Moonraker web server versions 0. 9. 3 and below when the ldap component is enabled. The flaw allows attackers to manipulate LDAP search filters via the login endpoint, enabling brute force discovery of LDAP entries such as user IDs and attributes by analyzing 401 error responses. This vulnerability does not require authentication or user interaction and has a low CVSS score of 2. 7. It was fixed in version 0. 10. 0. While exploitation does not lead to direct system compromise, it can leak sensitive directory information.
AI-Powered Analysis
Technical Analysis
Moonraker is a Python-based web server that provides API access to Klipper 3D printer firmware. Versions 0.9.3 and earlier, when configured with the ldap component enabled, are vulnerable to LDAP injection attacks at the login endpoint. The vulnerability arises from improper neutralization of special characters in LDAP search filters (CWE-90), allowing an attacker to inject crafted input that alters the LDAP query logic. By analyzing the 401 Unauthorized error responses, an attacker can determine whether LDAP search queries succeed or fail, enabling brute force enumeration of LDAP entries such as user IDs and attributes. This information disclosure can aid in further attacks or reconnaissance. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The flaw was addressed in Moonraker version 0.10.0 by properly sanitizing LDAP query inputs. The CVSS 4.0 base score is 2.7, reflecting low severity due to limited impact on confidentiality and no direct integrity or availability compromise. No known exploits are currently in the wild. The vulnerability is related to CWE-90 (LDAP Injection) and CWE-209 (Information Exposure Through an Error Message).
Potential Impact
For European organizations using Moonraker versions prior to 0.10.0 with LDAP enabled, this vulnerability can lead to unauthorized disclosure of LDAP directory information, including user identifiers and attributes. While it does not allow direct system compromise or code execution, the leaked information can facilitate targeted attacks such as credential stuffing, social engineering, or privilege escalation attempts. Organizations relying on LDAP for authentication and user management in 3D printing environments may face increased risk of reconnaissance by threat actors. This is particularly relevant for industries with sensitive intellectual property or manufacturing processes controlled via Klipper firmware. The impact on confidentiality is limited but non-negligible, especially if combined with other vulnerabilities. Availability and integrity are not directly affected. The low CVSS score aligns with this assessment, but the risk increases if attackers chain this with other exploits.
Mitigation Recommendations
The primary mitigation is to upgrade Moonraker to version 0.10.0 or later, where the LDAP injection vulnerability is fixed. Until upgrade is possible, organizations should disable the ldap component if not strictly required. Network-level controls should restrict access to the Moonraker login endpoint to trusted IP addresses or VPN users to reduce exposure. Implementing Web Application Firewalls (WAFs) with rules to detect and block LDAP injection patterns can provide additional protection. Monitoring logs for unusual LDAP query patterns or repeated 401 responses can help detect exploitation attempts. Regularly auditing LDAP configurations and access controls will minimize the impact of any information disclosure. Finally, educating administrators about the risks of LDAP injection and proper input sanitization is recommended to prevent similar issues in custom integrations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-21T18:38:22.474Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6972ad5b4623b1157c962ba9
Added to database: 1/22/2026, 11:06:03 PM
Last enriched: 1/22/2026, 11:22:10 PM
Last updated: 1/23/2026, 3:27:01 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0796: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ALGO 8180 IP Audio Alerter
HighCVE-2026-0795: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ALGO 8180 IP Audio Alerter
HighCVE-2026-0794: CWE-416: Use After Free in ALGO 8180 IP Audio Alerter
HighCVE-2026-0793: CWE-122: Heap-based Buffer Overflow in ALGO 8180 IP Audio Alerter
HighCVE-2026-0792: CWE-121: Stack-based Buffer Overflow in ALGO 8180 IP Audio Alerter
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.