This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Tue, 04 Feb 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-04-21'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-10-21T23:05:48.700Z

Reserved: 2023-02-28T00:00:00.000Z

Link: CVE-2023-27350

cve-icon Vulnrichment

Updated: 2024-08-02T12:09:43.478Z

cve-icon NVD

Status : Analyzed

Published: 2023-04-20T16:15:07.653

Modified: 2025-10-27T17:05:26.883

Link: CVE-2023-27350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses