Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3jqf-v4mv-747g | Moonraker affected by LDAP search filter injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 23 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arksine
Arksine moonraker |
|
| Vendors & Products |
Arksine
Arksine moonraker |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0. | |
| Title | Moonraker with LDAP Enabled Allows Malicious Search Filter Injection | |
| Weaknesses | CWE-209 CWE-90 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-23T20:03:49.510Z
Reserved: 2026-01-21T18:38:22.474Z
Link: CVE-2026-24130
Updated: 2026-01-23T20:03:45.816Z
Status : Awaiting Analysis
Published: 2026-01-22T23:15:58.477
Modified: 2026-01-26T15:04:14.850
Link: CVE-2026-24130
No data.
OpenCVE Enrichment
Updated: 2026-01-23T10:27:22Z
Github GHSA