Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. moonraker
  4. ›
  5. CVE-2026-24130

CVE-2026-24130: Moonraker affected by LDAP search filter injection

January 22, 2026 (updated January 23, 2026)

Instances of Moonraker configured with the ldap component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes.

References

  • github.com/Arksine/moonraker
  • github.com/Arksine/moonraker/commit/74c5d8e44c4a4abbfbb06fb991e7ebb9ac947f42
  • github.com/Arksine/moonraker/security/advisories/GHSA-3jqf-v4mv-747g
  • github.com/advisories/GHSA-3jqf-v4mv-747g
  • nvd.nist.gov/vuln/detail/CVE-2026-24130

Code Behaviors & Features

Detect and mitigate CVE-2026-24130 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.10.0

Fixed versions

  • 0.10.0

Solution

Upgrade to version 0.10.0 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')

Source file

pypi/moonraker/CVE-2026-24130.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:19 +0000.