Description
An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host’s file storage. This could exhaust system resources and prevent the service from operating as expected.
References (2)
Core 2
Core References
Vendor Advisory
https://www.papercut.com/kb/Main/SecurityBulletinJuly2023/
Third Party Advisory
https://www.tenable.com/security/research/tra-2023-23
Scores
CVSS v3
8.2
EPSS
0.0228
EPSS Percentile
84.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-434
Status
published
Products (2)
papercut/papercut_mf
< 22.1.3
papercut/papercut_ng
< 22.1.3
Published
Jul 25, 2023
Tracked Since
Feb 18, 2026