OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password.
An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance.
The vulnerability will be patched in version 1.10.0.
OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation.
This vulnerability was discovered and responsibly disclosed to OctoPrint by Timothy "TK" Ruppert.
{ "nvd_published_at": "2024-01-31T18:15:49Z", "cwe_ids": [ "CWE-287", "CWE-620" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-01-31T18:04:48Z" }