octoprint CVE Vulnerabilities & Metrics

Focus on octoprint vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About octoprint Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with octoprint. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total octoprint CVEs: 17
Earliest CVE date: 07 Sep 2018, 19:29 UTC
Latest CVE date: 05 Nov 2024, 19:15 UTC

Latest CVE reference: CVE-2024-51493

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical octoprint CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.44

Max CVSS: 6.4

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 5
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS octoprint CVEs

These are the five CVEs with the highest CVSS scores for octoprint, sorted by severity first and recency.

All CVEs for octoprint

CVE-2024-51493 octoprint vulnerability CVSS: 0 05 Nov 2024, 19:15 UTC

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2 contain a vulnerability that allows an attacker that has gained temporary control over an authenticated victim's OctoPrint browser session to retrieve/recreate/delete the user's or - if the victim has admin permissions - the global API key without having to reauthenticate by re-entering the user account's password. An attacker could use a stolen API key to access OctoPrint through its API, or disrupt workflows depending on the API key they deleted. This vulnerability will be patched in version 1.10.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-49377 octoprint vulnerability CVSS: 0 05 Nov 2024, 19:15 UTC

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2 contain reflected XSS vulnerabilities in the login dialog and the standalone application key confirmation dialog. An attacker who successfully talked a victim into clicking on a specially crafted login link, or a malicious app running on a victim's computer triggering the application key workflow with specially crafted parameters and then redirecting the victim to the related standalone confirmation dialog could use this to retrieve or modify sensitive configuration settings, interrupt prints or otherwise interact with the OctoPrint instance in a malicious way. The above mentioned specific vulnerabilities of the login dialog and the standalone application key confirmation dialog have been patched in the bugfix release 1.10.3 by individual escaping of the detected locations. A global change throughout all of OctoPrint's templating system with the upcoming 1.11.0 release will handle this further, switching to globally enforced automatic escaping and thus reducing the attack surface in general. The latter will also improve the security of third party plugins. During a transition period, third party plugins will be able to opt into the automatic escaping. With OctoPrint 1.13.0, automatic escaping will be switched over to be enforced even for third party plugins, unless they explicitly opt-out.

CVE-2024-32977 octoprint vulnerability CVSS: 0 14 May 2024, 16:17 UTC

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.0 contain a vulnerability that allows an unauthenticated attacker to completely bypass the authentication if the `autologinLocal` option is enabled within `config.yaml`, even if they come from networks that are not configured as `localNetworks`, spoofing their IP via the `X-Forwarded-For` header. If autologin is not enabled, this vulnerability does not have any impact. The vulnerability has been patched in version 1.10.1. Until the patch has been applied, OctoPrint administrators who have autologin enabled on their instances should disable it and/or to make the instance inaccessible from potentially hostile networks like the internet.

CVE-2024-28237 octoprint vulnerability CVSS: 0 18 Mar 2024, 22:15 UTC

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to configure or talk a victim with administrator rights into configuring a webcam snapshot URL which when tested through the "Test" button included in the web interface will execute JavaScript code in the victims browser when attempting to render the snapshot image. An attacker who successfully talked a victim with admin rights into performing a snapshot test with such a crafted URL could use this to retrieve or modify sensitive configuration settings, interrupt prints or otherwise interact with the OctoPrint instance in a malicious way. The vulnerability is patched in version 1.10.0rc3. OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation and what settings they modify based on instructions by strangers.

CVE-2024-23637 octoprint vulnerability CVSS: 0 31 Jan 2024, 18:15 UTC

OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password. An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance. The vulnerability will be patched in version 1.10.0.

CVE-2023-41047 octoprint vulnerability CVSS: 0 09 Oct 2023, 16:15 UTC

OctoPrint is a web interface for 3D printers. OctoPrint versions up until and including 1.9.2 contain a vulnerability that allows malicious admins to configure a specially crafted GCODE script that will allow code execution during rendering of that script. An attacker might use this to extract data managed by OctoPrint, or manipulate data managed by OctoPrint, as well as execute arbitrary commands with the rights of the OctoPrint process on the server system. OctoPrint versions from 1.9.3 onward have been patched. Administrators of OctoPrint instances are advised to make sure they can trust all other administrators on their instance and to also not blindly configure arbitrary GCODE scripts found online or provided to them by third parties.

CVE-2022-3607 octoprint vulnerability CVSS: 0 19 Oct 2022, 13:15 UTC

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository octoprint/octoprint prior to 1.8.3.

CVE-2022-3068 octoprint vulnerability CVSS: 0 21 Sep 2022, 12:15 UTC

Improper Privilege Management in GitHub repository octoprint/octoprint prior to 1.8.3.

CVE-2022-2888 octoprint vulnerability CVSS: 0 21 Sep 2022, 12:15 UTC

If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists.

CVE-2022-2872 octoprint vulnerability CVSS: 0 21 Sep 2022, 10:15 UTC

Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3.

CVE-2022-2930 octoprint vulnerability CVSS: 0 22 Aug 2022, 12:15 UTC

Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3.

CVE-2022-2822 octoprint vulnerability CVSS: 0 15 Aug 2022, 11:21 UTC

An attacker can freely brute force username and password and can takeover any account. An attacker could easily guess user passwords and gain access to user and administrative accounts.

CVE-2022-1432 octoprint vulnerability CVSS: 4.6 18 May 2022, 14:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.

CVE-2022-1430 octoprint vulnerability CVSS: 5.1 18 May 2022, 14:15 UTC

Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0.

CVE-2021-32561 octoprint vulnerability CVSS: 4.3 11 May 2021, 14:15 UTC

OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters.

CVE-2021-32560 octoprint vulnerability CVSS: 4.0 11 May 2021, 14:15 UTC

The Logging subsystem in OctoPrint before 1.6.0 has incorrect access control because it attempts to manage files that are not *.log files.

CVE-2018-16710 octoprint vulnerability CVSS: 6.4 07 Sep 2018, 19:29 UTC

OctoPrint through 1.3.9 allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests on port 8081. NOTE: the vendor disputes the significance of this report because their documentation states that with "blind port forwarding ... Putting OctoPrint onto the public internet is a terrible idea, and I really can't emphasize that enough.