Skip to content

Commit c44e2eb

Browse files
1 parent 13cc44d commit c44e2eb

File tree

2 files changed

+133
-0
lines changed

2 files changed

+133
-0
lines changed
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-crvm-xjhm-9h29",
4+
"modified": "2025-11-04T15:42:48Z",
5+
"published": "2025-11-04T15:42:48Z",
6+
"aliases": [
7+
"CVE-2025-64187"
8+
],
9+
"summary": "OctoPrint vulnerable to XSS in Action Commands Notification and Prompt",
10+
"details": "### Impact\n\nOctoPrint versions up to and including 1.11.3 are affected by a vulnerability that allows injection of arbitrary HTML and JavaScript into Action Command notification and prompt popups generated by the printer.\n\nAn attacker who successfully convinces a victim to print a specially crafted file could exploit this issue to disrupt ongoing prints, extract information (including sensitive configuration settings, if the targeted user has the necessary permissions for that), or perform other actions on behalf of the targeted user within the OctoPrint instance.\n\n### Patches\n\nThe vulnerability will be patched in version 1.11.4.\n\n### Workaround\n\nOctoPrint administrators can mitigate the risk by disabling popups:\n- for Action Command notifications, uncheck _OctoPrint Settings -> Printer Notifications -> Enable popups_\n- for Action Command prompts, set _OctoPrint Settings -> Printer Dialogs -> Enable support -> Never_\n\nIt is also strongly recommended to ensure that files being printed originate from trusted sources, and, whenever possible, are sliced with your own slicer.\n\n### Credits\n\nThis vulnerability was discovered and responsibly disclosed to OctoPrint by [Jacopo Tediosi](https://github.com/jacopotediosi).",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "octoprint"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.11.4"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 1.11.3"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-crvm-xjhm-9h29"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/OctoPrint/OctoPrint/commit/9112e07b1085f4c1ee9eefc67985809251057a44"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/OctoPrint/OctoPrint"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-79",
58+
"CWE-80"
59+
],
60+
"severity": "MODERATE",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-11-04T15:42:48Z",
63+
"nvd_published_at": null
64+
}
65+
}
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-gf93-xccm-5g6j",
4+
"modified": "2025-11-04T15:43:52Z",
5+
"published": "2025-11-04T15:43:52Z",
6+
"aliases": [
7+
"CVE-2025-64171"
8+
],
9+
"summary": "MARIN3R: Cross-Namespace Vulnerability in the Operator",
10+
"details": "## Summary\nCross-namespace Secret access vulnerability in DiscoveryServiceCertificate \nallows users to bypass RBAC and access Secrets in unauthorized namespaces.\n\n## Affected Versions\nAll versions prior to v0.13.4\n\n## Patched Versions\nv0.13.4 and later\n\n## Impact\nUsers with permission to create DiscoveryServiceCertificate resources in one \nnamespace can indirectly read Secrets from other namespaces, completely \nbypassing Kubernetes RBAC security boundaries.\n\n## Workarounds\nRestrict DiscoveryServiceCertificate create permissions to cluster administrators \nonly until patched version is deployed.\n\n## Credit\nThanks to @debuggerchen for the responsible disclosure.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/3scale-sre/marin3r"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.13.4"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 0.13.3"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/3scale-sre/marin3r/security/advisories/GHSA-gf93-xccm-5g6j"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/3scale-sre/marin3r/pull/294"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/3scale-sre/marin3r/commit/c60246a43ae8c0c38dd7267f298d68a121a159fa"
53+
},
54+
{
55+
"type": "PACKAGE",
56+
"url": "https://github.com/3scale-sre/marin3r"
57+
}
58+
],
59+
"database_specific": {
60+
"cwe_ids": [
61+
"CWE-862"
62+
],
63+
"severity": "HIGH",
64+
"github_reviewed": true,
65+
"github_reviewed_at": "2025-11-04T15:43:52Z",
66+
"nvd_published_at": null
67+
}
68+
}

0 commit comments

Comments
 (0)