GHSA-crvm-xjhm-9h29

Suggest an improvement
Source
https://github.com/advisories/GHSA-crvm-xjhm-9h29
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-crvm-xjhm-9h29/GHSA-crvm-xjhm-9h29.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-crvm-xjhm-9h29
Aliases
Published
2025-11-04T15:42:48Z
Modified
2025-11-07T17:30:22.785889Z
Severity
  • 4.6 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:N CVSS Calculator
Summary
OctoPrint vulnerable to XSS in Action Commands Notification and Prompt
Details

Impact

OctoPrint versions up to and including 1.11.3 are affected by a vulnerability that allows injection of arbitrary HTML and JavaScript into Action Command notification and prompt popups generated by the printer.

An attacker who successfully convinces a victim to print a specially crafted file could exploit this issue to disrupt ongoing prints, extract information (including sensitive configuration settings, if the targeted user has the necessary permissions for that), or perform other actions on behalf of the targeted user within the OctoPrint instance.

Patches

The vulnerability will be patched in version 1.11.4.

Workaround

OctoPrint administrators can mitigate the risk by disabling popups: - for Action Command notifications, uncheck OctoPrint Settings -> Printer Notifications -> Enable popups - for Action Command prompts, set OctoPrint Settings -> Printer Dialogs -> Enable support -> Never

It is also strongly recommended to ensure that files being printed originate from trusted sources, and, whenever possible, are sliced with your own slicer.

Credits

This vulnerability was discovered and responsibly disclosed to OctoPrint by Jacopo Tediosi.

Database specific
{
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-79",
        "CWE-80"
    ],
    "github_reviewed_at": "2025-11-04T15:42:48Z",
    "nvd_published_at": "2025-11-07T04:15:47Z",
    "github_reviewed": true
}
References

Affected packages

PyPI / octoprint

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.4

Affected versions

1.*

1.3.11
1.3.12rc1
1.3.12rc3
1.3.12
1.4.0rc1
1.4.0rc2
1.4.0rc3
1.4.0rc4
1.4.0rc5
1.4.0rc6
1.4.0
1.4.1rc1
1.4.1rc2
1.4.1rc3
1.4.1rc4
1.4.1
1.4.2
1.5.0rc1
1.5.0rc2
1.5.0rc3
1.5.0
1.5.1
1.5.2
1.5.3
1.6.0rc1
1.6.0rc2
1.6.0rc3
1.6.0
1.6.1
1.7.0rc1
1.7.0rc2
1.7.0rc3
1.7.0
1.7.1
1.7.2
1.7.3
1.8.0rc1
1.8.0rc2
1.8.0rc3
1.8.0rc4
1.8.0rc5
1.8.0
1.8.1
1.8.2
1.8.3
1.8.4
1.8.5
1.8.6
1.8.7
1.9.0rc1
1.9.0rc2
1.9.0rc3
1.9.0rc4
1.9.0rc5
1.9.0rc6
1.9.0
1.9.1
1.9.2
1.9.3
1.10.0rc1
1.10.0rc2
1.10.0rc3
1.10.0rc4
1.10.0
1.10.1
1.10.2
1.10.3
1.11.0rc1
1.11.0rc2
1.11.0rc3
1.11.0rc4
1.11.0rc5
1.11.0rc6
1.11.0rc7
1.11.0
1.11.1
1.11.2
1.11.3

Database specific

last_known_affected_version_range

"<= 1.11.3"