Openprinting Cups
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Openprinting Cups.
By the Year
In 2025 there have been 2 vulnerabilities in Openprinting Cups with an average score of 7.3 out of ten. Last year, in 2024 Cups had 1 security vulnerability published. That is, 1 more vulnerability have already been reported in 2025 as compared to last year. However, the average CVE base score of the vulnerabilities in 2025 is greater by 1.95.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 2 | 7.25 |
| 2024 | 1 | 5.30 |
| 2023 | 3 | 6.53 |
| 2022 | 1 | 6.70 |
It may take a day or so for new Cups vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Openprinting Cups Security Vulnerabilities
Remote DoS via Unsafe Deserialization in CUPS 2.4.12 and Earlier
CVE-2025-58364
6.5 - Medium
- September 11, 2025
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
Improper Input Validation
CUPS auth bypass in AuthType != Basic pre-2.4.13, fixed 2.4.13
CVE-2025-58060
8 - High
- September 11, 2025
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
authentification
CUPS cups-browsed IPP Remote Command Execution via INADDR_ANY Binding
CVE-2024-47176
5.3 - Medium
- September 26, 2024
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Binding to an Unrestricted IP Address
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document
CVE-2023-4504
7 - High
- September 21, 2023
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Heap-based Buffer Overflow
OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems
CVE-2023-34241
7.1 - High
- June 22, 2023
OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process. The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/etc/hosts.deny`. Version 2.4.6 has a patch for this issue.
Dangling pointer
OpenPrinting CUPS is an open source printing system
CVE-2023-32324
5.5 - Medium
- June 01, 2023
OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.
Memory Corruption
A logic issue was addressed with improved state management
CVE-2022-26691
6.7 - Medium
- May 26, 2022
A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.
Incorrect Comparison
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Openprinting Cups or by Openprinting? Click the Watch button to subscribe.