Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25505: CWE-306: Missing Authentication for Critical Function in maziggy bambuddy

0
Critical
VulnerabilityCVE-2026-25505cvecve-2026-25505cwe-306cwe-321
Published: Wed Feb 04 2026 (02/04/2026, 20:06:30 UTC)
Source: CVE Database V5
Vendor/Project: maziggy
Product: bambuddy

Description

Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D printers. Prior to version 0.1.7, a hardcoded secret key used for signing JWTs is checked into source code and ManyAPI routes do not check authentication. This issue has been patched in version 0.1.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:22:51 UTC

Technical Analysis

CVE-2026-25505 identifies a critical security flaw in the bambuddy software, a print archive and management system designed for Bambu Lab 3D printers. The vulnerability arises from two main issues: first, a hardcoded secret key used for signing JSON Web Tokens (JWTs) is embedded directly in the source code prior to version 0.1.7. This key exposure (CWE-321) allows attackers to forge valid JWTs, effectively bypassing authentication mechanisms. Second, ManyAPI routes within bambuddy do not enforce authentication checks (CWE-306), permitting unauthenticated users to invoke critical functions remotely. Because JWTs are central to session management and access control, the combination of a known secret key and missing authentication checks enables attackers to gain unauthorized access to administrative or sensitive functionalities. The vulnerability is remotely exploitable without requiring any privileges or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, indicating high impact on confidentiality, integrity, and availability. The vendor addressed this issue in bambuddy version 0.1.7 by removing the hardcoded key and enforcing proper authentication on API routes. No known exploits have been reported in the wild as of the publication date, but the severity and ease of exploitation make it a significant threat to users of affected versions.

Potential Impact

For European organizations, the impact of CVE-2026-25505 can be severe, particularly for those utilizing bambuddy to manage Bambu Lab 3D printers in manufacturing, prototyping, or research environments. Unauthorized access could lead to theft or manipulation of print archives, disruption of 3D printing workflows, and potential sabotage of physical outputs. Confidentiality breaches may expose proprietary designs or intellectual property. Integrity violations could result in altered print jobs, causing defective or dangerous products. Availability impacts might include denial of service by disrupting print management functions. Given the criticality and remote exploitability without authentication, attackers could leverage this vulnerability to establish persistent footholds or pivot within networks. This risk is heightened in sectors where 3D printing is integral to production or innovation, such as aerospace, automotive, healthcare, and academia. The vulnerability also poses compliance risks under GDPR if sensitive data is compromised. Thus, European entities must prioritize remediation to prevent operational, financial, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-25505, European organizations should immediately upgrade bambuddy installations to version 0.1.7 or later, where the vulnerability is patched. If upgrading is temporarily not feasible, restrict network access to bambuddy services by implementing strict firewall rules and network segmentation to limit exposure to trusted users only. Conduct thorough audits of bambuddy API usage logs to detect any unauthorized access attempts. Rotate any JWT signing keys and secrets used in the environment to invalidate potentially compromised tokens. Employ Web Application Firewalls (WAFs) with custom rules to block suspicious API requests targeting ManyAPI routes. Additionally, implement multi-factor authentication (MFA) on management interfaces where possible to add an extra layer of security. Regularly monitor vendor advisories for updates or additional patches. Finally, educate relevant personnel about the risks of hardcoded secrets and the importance of secure coding practices to prevent similar vulnerabilities in custom or third-party software.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983a8cef9fa50a62fa9fe88

Added to database: 2/4/2026, 8:15:10 PM

Last enriched: 2/12/2026, 7:22:51 AM

Last updated: 3/22/2026, 2:21:11 AM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses