Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25505: CWE-306: Missing Authentication for Critical Function in maziggy bambuddy

0
Critical
VulnerabilityCVE-2026-25505cvecve-2026-25505cwe-306cwe-321
Published: Wed Feb 04 2026 (02/04/2026, 20:06:30 UTC)
Source: CVE Database V5
Vendor/Project: maziggy
Product: bambuddy

Description

Bambuddy is a self-hosted print archive and management system for Bambu Lab 3D printers. Prior to version 0.1.7, a hardcoded secret key used for signing JWTs is checked into source code and ManyAPI routes do not check authentication. This issue has been patched in version 0.1.7.

AI-Powered Analysis

AILast updated: 02/04/2026, 20:30:06 UTC

Technical Analysis

CVE-2026-25505 is a critical security vulnerability affecting bambuddy, a self-hosted print archive and management system designed for Bambu Lab 3D printers. The root cause is twofold: first, a hardcoded secret key used for signing JSON Web Tokens (JWTs) is embedded in the source code prior to version 0.1.7, violating secure key management best practices (CWE-321). Second, many API routes within bambuddy do not enforce authentication checks (CWE-306), allowing unauthenticated users to access critical functions. Because the JWT signing key is hardcoded and publicly accessible in the source, attackers can forge valid tokens to bypass authentication mechanisms. The lack of authentication on many API endpoints further exacerbates the issue, enabling attackers to invoke privileged functions remotely over the network without any credentials or user interaction. This vulnerability impacts confidentiality, integrity, and availability of the system, as attackers can manipulate print archives, disrupt print jobs, or exfiltrate sensitive data related to 3D printing operations. The vulnerability was assigned a CVSS v3.1 score of 9.8, reflecting its critical severity with network attack vector, no privileges required, no user interaction, and full impact on all security properties. The issue was patched in bambuddy version 0.1.7 by removing the hardcoded secret and enforcing authentication on all API routes. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact make this a high-priority patch for users.

Potential Impact

For European organizations, especially those involved in manufacturing, prototyping, or research using Bambu Lab 3D printers, this vulnerability poses a significant risk. Attackers could remotely access and manipulate print archives, disrupt production workflows, or steal intellectual property related to 3D designs. The compromise of integrity and availability could lead to defective or maliciously altered prints, causing financial loss or safety hazards. Confidentiality breaches could expose proprietary designs or sensitive operational data. Given the network-exploitable nature and lack of authentication, attackers can operate stealthily and at scale. This risk is heightened in sectors like automotive, aerospace, and medical device manufacturing prevalent in Europe, where 3D printing is increasingly integrated into supply chains. Additionally, organizations hosting bambuddy on internal networks without strong perimeter defenses remain vulnerable to insider threats or lateral movement by attackers who gain initial access elsewhere.

Mitigation Recommendations

1. Immediately upgrade bambuddy installations to version 0.1.7 or later, which patches the hardcoded secret and enforces authentication on all API routes. 2. Audit existing deployments for signs of compromise, including unauthorized API calls or suspicious JWT tokens. 3. Rotate any secrets or credentials that may have been exposed due to the hardcoded key. 4. Implement network segmentation to isolate 3D printer management systems from general corporate networks and the internet. 5. Enforce strict access controls and monitor API usage logs for anomalies. 6. Use Web Application Firewalls (WAFs) or API gateways to add an additional layer of authentication and rate limiting. 7. Educate staff on the importance of timely patching and secure configuration of self-hosted services. 8. Consider deploying intrusion detection systems (IDS) to detect exploitation attempts targeting bambuddy. 9. Regularly review and update security policies around 3D printing infrastructure to include vulnerability management and incident response procedures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983a8cef9fa50a62fa9fe88

Added to database: 2/4/2026, 8:15:10 PM

Last enriched: 2/4/2026, 8:30:06 PM

Last updated: 2/4/2026, 11:52:59 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats