Vulnerability Description
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arksine | Moonraker | < 0.10.0 |
Related Weaknesses (CWE)
References
- https://github.com/Arksine/moonraker/commit/74c5d8e44c4a4abbfbb06fb991e7ebb9ac94Patch
- https://github.com/Arksine/moonraker/security/advisories/GHSA-3jqf-v4mv-747gMitigationVendor Advisory
FAQ
What is CVE-2026-24130?
CVE-2026-24130 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search...
How severe is CVE-2026-24130?
CVE-2026-24130 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24130?
Check the references section above for vendor advisories and patch information. Affected products include: Arksine Moonraker.