Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-17715 | OctoPrint vulnerable to possible file extraction via upload endpoints |
Github GHSA |
GHSA-m9jh-jf9h-x3h2 | OctoPrint vulnerable to possible file extraction via upload endpoints |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 Aug 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:* |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 10 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Jun 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 10 Jun 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2. | |
| Title | OctoPrint vulnerable to possible file extraction via upload endpoints | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-10T15:36:39.800Z
Reserved: 2025-05-15T16:06:40.941Z
Link: CVE-2025-48067
Updated: 2025-06-10T15:36:31.587Z
Status : Analyzed
Published: 2025-06-10T16:15:41.357
Modified: 2025-08-12T13:44:39.947
Link: CVE-2025-48067
No data.
OpenCVE Enrichment
Updated: 2025-06-23T09:16:30Z
EUVD
Github GHSA