CVE-2026-25505
Bambuddy · Bambuddy
Bambuddy versions prior to 0.1.7 contain a hardcoded JWT secret key and lack authentication checks on many API routes, allowing unauthenticated access and system compromise.
Executive summary
Bambuddy is susceptible to complete unauthorized access and control due to a hardcoded cryptographic secret and a failure to enforce authentication on critical API routes.
Vulnerability
The application utilizes a hardcoded secret key for signing JSON Web Tokens (JWT), which was exposed in the source code. Furthermore, numerous API routes fail to perform any authentication checks, allowing unauthenticated attackers to interact with the system as if they were administrators.
Business impact
With a CVSS score of 9.8, the impact is critical. Attackers can gain full control over 3D printing workflows, potentially causing physical damage to hardware, stealing proprietary 3D designs, or using the self-hosted server as a pivot point into the local network.
Remediation
Immediate Action: Update Bambuddy to version 0.1.7 or higher immediately to rotate the secret keys and enable mandatory authentication on all API routes.
Proactive Monitoring: Review access logs for requests to API routes that originated from unexpected IP addresses or showed signs of administrative actions without valid credentials.
Compensating Controls: Place the Bambuddy instance behind a reverse proxy that enforces its own authentication (e.g., Authelia or Basic Auth) until the application is patched.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The combination of hardcoded secrets and missing authentication is a severe security failure. Administrators must update to version 0.1.7 immediately to secure their printing infrastructure and intellectual property.