Introduction
Attackers can bypass authentication in CUPS administrative interfaces if the system is configured with any AuthType other than Basic. This flaw can grant unauthorized access to print server management, potentially exposing sensitive print jobs or allowing configuration changes. CUPS (Common UNIX Printing System) is the standard printing system for Linux and other Unix-like operating systems, maintained by OpenPrinting and deployed on millions of systems worldwide.
Technical Information
CVE-2025-58060 is an authentication bypass vulnerability in CUPS versions 2.4.12 and earlier. The issue is triggered when the CUPS configuration sets the AuthType
directive to any value except Basic
(such as Digest
or certificate-based authentication). If a client request includes an Authorization: Basic ...
header, CUPS fails to check the password, allowing the request to proceed without proper authentication.
The root cause is a logic flaw in the authentication handling code. Specifically, the code does not enforce credential verification when there is a mismatch between the configured AuthType
and the type of Authorization
header received. This allows attackers to craft HTTP requests with an Authorization: Basic
header that will be accepted even if the password is invalid or missing, as long as the server is not set to use Basic authentication.
This vulnerability is particularly impactful for environments that have intentionally chosen stronger authentication mechanisms, as their configurations are rendered ineffective by this flaw. The vulnerability affects both the CUPS web administration interface (commonly on port 631) and any service endpoints protected by CUPS authentication.
Affected Systems and Versions
- Product: OpenPrinting CUPS
- Affected versions: 2.4.12 and all earlier versions
- Vulnerable configurations: Any CUPS deployment where
AuthType
is set to a value other thanBasic
(for example,Digest
or certificate-based authentication) - Fixed in: CUPS version 2.4.13
Vendor Security History
OpenPrinting has addressed several notable CUPS vulnerabilities in recent years, including remote code execution and privilege escalation issues disclosed in 2024. The project typically responds quickly to security reports, coordinating with Linux distributions to release patches. CUPS's wide deployment means that vulnerabilities can have broad impact, and OpenPrinting's security advisories are closely watched by the industry.