CVE-2025-48067

5.4 MEDIUM

📋 TL;DR

OctoPrint versions up to 1.11.1 contain a file exfiltration vulnerability where authenticated users with FILE_UPLOAD permission can move readable host files into the upload folder, making them downloadable. This affects all OctoPrint installations running vulnerable versions. The vulnerability allows attackers to access sensitive files the OctoPrint process can read.

💻 Affected Systems

Products:
  • OctoPrint
Versions: All versions up to and including 1.11.1
Operating Systems: All platforms running OctoPrint
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have FILE_UPLOAD permission. Default installations grant this to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive system files, configuration files, SSH keys, or other credentials stored on the host, potentially leading to full system compromise.

🟠

Likely Case

Authenticated users with FILE_UPLOAD permission could access sensitive OctoPrint configuration files, logs, or other application data they shouldn't normally access.

🟢

If Mitigated

With proper permission controls and network segmentation, impact is limited to files OctoPrint can read, which should be minimal in well-configured environments.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with FILE_UPLOAD permission. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11.2

Vendor Advisory: https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-m9jh-jf9h-x3h2

Restart Required: Yes

Instructions:

1. Backup your OctoPrint configuration. 2. Update OctoPrint to version 1.11.2 or later using the built-in updater or manual installation. 3. Restart the OctoPrint service.

🔧 Temporary Workarounds

Restrict FILE_UPLOAD permissions

all

Remove FILE_UPLOAD permission from all users except absolutely necessary administrators.

Use OctoPrint's user management interface to modify permissions

Implement network segmentation

all

Isolate OctoPrint instance from sensitive systems and limit network access.

🧯 If You Can't Patch

  • Restrict FILE_UPLOAD permissions to minimal necessary users only
  • Implement strict network access controls and isolate OctoPrint from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check OctoPrint version in web interface or via command line. If version is 1.11.1 or earlier, system is vulnerable.

Check Version:

octoprint --version or check web interface About page

Verify Fix Applied:

Verify OctoPrint version is 1.11.2 or later. Test that users with FILE_UPLOAD permission cannot move files outside designated upload areas.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file movement operations in upload logs
  • Multiple file operations from single user in short time

Network Indicators:

  • Unusual download patterns from OctoPrint upload endpoints

SIEM Query:

source="octoprint.log" AND ("move" OR "rename") AND NOT path CONTAINS "/uploads/"

🔗 References

📤 Share & Export