CVE-2025-57521

Bambu Studio 2.1.1.52 and earlier is affected by a vulnerability that allows arbitrary code execution during application startup. The application loads a network plugin without validating its digital signature or verifying its authenticity. A local attacker can exploit this behavior by placing a malicious component in the expected location, which is controllable by the attacker (e.g., under %APPDATA%), resulting in code execution within the context of the user. The main application is digitally signed, which may allow a malicious component to inherit trust and evade detection by security solutions that rely on signed parent processes.
Configurations

No configuration.

History

22 Oct 2025, 19:15

Type Values Removed Values Added
References
  • () https://wiki.bambulab.com/en/software/bambu-studio/release/release-note-2-3-0 -

22 Oct 2025, 14:15

Type Values Removed Values Added
References
  • {'url': 'http://bambu.com', 'source': 'cve@mitre.org'}

21 Oct 2025, 21:15

Type Values Removed Values Added
CWE CWE-77
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

21 Oct 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-21 15:15

Updated : 2025-10-22 19:15


NVD link : CVE-2025-57521

Mitre link : CVE-2025-57521

CVE.ORG link : CVE-2025-57521


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')