CVE-2026-25505

Bambuddy · Bambuddy

Bambuddy versions prior to 0.1.7 contain a hardcoded JWT secret key and lack authentication checks on many API routes, allowing unauthenticated access and system compromise.

Executive summary

Bambuddy is susceptible to complete unauthorized access and control due to a hardcoded cryptographic secret and a failure to enforce authentication on critical API routes.

Vulnerability

The application utilizes a hardcoded secret key for signing JSON Web Tokens (JWT), which was exposed in the source code. Furthermore, numerous API routes fail to perform any authentication checks, allowing unauthenticated attackers to interact with the system as if they were administrators.

Business impact

With a CVSS score of 9.8, the impact is critical. Attackers can gain full control over 3D printing workflows, potentially causing physical damage to hardware, stealing proprietary 3D designs, or using the self-hosted server as a pivot point into the local network.

Remediation

Immediate Action: Update Bambuddy to version 0.1.7 or higher immediately to rotate the secret keys and enable mandatory authentication on all API routes.

Proactive Monitoring: Review access logs for requests to API routes that originated from unexpected IP addresses or showed signs of administrative actions without valid credentials.

Compensating Controls: Place the Bambuddy instance behind a reverse proxy that enforces its own authentication (e.g., Authelia or Basic Auth) until the application is patched.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The combination of hardcoded secrets and missing authentication is a severe security failure. Administrators must update to version 0.1.7 immediately to secure their printing infrastructure and intellectual property.