CVE-2025-61915
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-29

Last updated on: 2025-12-04

Assigner: GitHub, Inc.

Description
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-29
Last Modified
2025-12-04
Generated
2026-05-06
AI Q&A
2025-11-29
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
openprinting cups to 2.4.15 (exc)
opengroup unix *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-124 The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
CWE-129 The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in OpenPrinting CUPS allows a user in the lpadmin group to use the cups web UI to modify the configuration by inserting a malicious line. When the cupsd process, which runs as root, parses this new configuration, it causes an out-of-bound write, potentially leading to a denial of service or other impacts. The issue was fixed in version 2.4.15.


How can this vulnerability impact me? :

The vulnerability can cause the cupsd process to perform an out-of-bound write, which may lead to a denial of service or other unexpected behavior on the system. Since cupsd runs as root, this could affect system stability or security.


What immediate steps should I take to mitigate this vulnerability?

Upgrade OpenPrinting CUPS to version 2.4.15 or later, as this version contains the patch for the vulnerability. Additionally, restrict lpadmin group membership to trusted users only to minimize risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart