CVE-2023-27351

PaperCut NG/MF — Pre-Auth Authentication Bypass via SecurityRequestFilter Enabling Information Disclosure
⚠️ CVSS 3.1  7.5 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

What is PaperCut?

PaperCut NG and PaperCut MF are widely deployed print management platforms used by universities, schools, hospitals, law firms, and enterprises worldwide to track, control, and charge for print jobs. The Application Server web interface — exposed on TCP port 9191/9192 — is the central management console where administrators configure printers, manage user accounts, and enforce print policies. Because PaperCut typically has access to user directory data (Active Directory, LDAP, Google Workspace, Microsoft 365), its database is a valuable reconnaissance target: it stores usernames, email addresses, office/department details, card numbers, and internal password hashes.

Overview

Actively Exploited. This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog on April 20, 2026 with a remediation deadline of May 4, 2026. Federal agencies are required to apply mitigations per BOD 22-01.

CVE-2023-27351 is a pre-authentication information disclosure vulnerability in PaperCut NG and MF. The flaw exists within the SecurityRequestFilter class, which is responsible for enforcing authentication on incoming HTTP requests. Due to an improper implementation of the authentication algorithm (CWE-287), an unauthenticated remote attacker can bypass authentication checks and access protected API endpoints that expose sensitive user data.

This vulnerability was disclosed simultaneously with the far more severe CVE-2023-27350 (CVSS 9.8 — unauthenticated remote code execution), which overshadowed CVE-2023-27351 in initial coverage. Both were reported through Trend Micro's Zero Day Initiative (ZDI) program. PaperCut patched both vulnerabilities in early March 2023 before public disclosure.

Affected Versions

Status PaperCut MF/NG Version Range
Vulnerable 15.0.0 – 19.2.7
Vulnerable 20.0.0 – 20.1.6
Vulnerable 21.0.0 – 21.2.10
Vulnerable 22.0.0 – 22.0.8
Fixed 20.1.7, 21.2.11, 22.0.9 and later

Versions prior to 15.0 are not affected by CVE-2023-27351 specifically (though they may be affected by CVE-2023-27350).

Technical Details

The vulnerability exists in the SecurityRequestFilter class, the HTTP request filter that controls authentication enforcement in PaperCut's web application. The filter is responsible for evaluating whether an incoming request is exempt from authentication (e.g., public assets) or requires a valid session.

The root cause is an improper implementation of the authentication decision algorithm — under certain conditions, the filter incorrectly classifies requests as unauthenticated-exempt, bypassing session checks entirely. No authentication token, cookie, or credential is needed; a specially crafted HTTP request directly reaches protected API endpoints.

What an attacker can retrieve without authentication:

  • Usernames and full names from the user database
  • Email addresses
  • Office and department information
  • Card numbers (used for physical card-swipe printing)
  • Hashed passwords for internal PaperCut-created users (not for directory-synced accounts from AD/Microsoft 365/Google Workspace)

This data is useful for reconnaissance, phishing, lateral movement, and — if weak password hashes are cracked — credential reuse attacks.

Attack characteristics:

  • Authentication required: None
  • Attack complexity: Low
  • Network-accessible: Yes (port 9191/9192)
  • User interaction: None

Discovery

CVE-2023-27351 was discovered and reported through the Trend Micro Zero Day Initiative (ZDI) program under tracking number ZDI-CAN-19226 (published as ZDI-23-232). PaperCut received the report via ZDI and patched the vulnerability in early March 2023, approximately six weeks before ZDI published its advisory.

Exploitation Context

CVE-2023-27351 was added to CISA's KEV catalog in April 2026, over three years after its original disclosure. This delayed KEV listing indicates that exploitation was confirmed recently — likely in opportunistic attacks targeting unpatched legacy installations of PaperCut.

The companion vulnerability, CVE-2023-27350 (CVSS 9.8), saw immediate widespread exploitation starting April 14, 2023 — the same day ZDI published its advisory. Nation-state and ransomware actors rapidly developed working exploits for CVE-2023-27350, with multiple threat actor groups deploying tools including Cobalt Strike, DiceLoader, and TrueBot via unpatched PaperCut servers. The KEV listing of CVE-2023-27351 suggests it is now being used alongside or independent of CVE-2023-27350 in ongoing campaigns.

Its EPSS score stands at 0.877 (87.7th percentile), reflecting high likelihood of exploitation.

Remediation

CISA BOD 22-01 Deadline: May 4, 2026. Federal agencies must apply mitigations. All organizations should treat this as urgent given the companion CVE-2023-27350 exploitation history.
  1. Upgrade PaperCut MF or NG to version 22.0.9, 21.2.11, or 20.1.7 or any later release. Patched versions were available since March 8, 2023.
  2. If immediate patching is not possible, restrict network access to the PaperCut Application Server (ports 9191/9192) to only trusted administrator IP addresses via firewall or network ACL.
  3. Audit your PaperCut version — check via the web admin console at http://<server>:9191/app. Versions 22.0.9+ are fixed.
  4. Review PaperCut Application Server logs for unexpected unauthenticated API requests targeting user data endpoints.
  5. Consider whether user data exported from PaperCut (emails, usernames, card numbers) should be treated as potentially compromised if you were running a vulnerable version during the exposure window.

Key Details

PropertyValue
CVE ID CVE-2023-27351
Vendor / Product PaperCut — NG/MF
NVD Published2023-04-20
NVD Last Modified2026-04-21
CVSS 3.1 Score7.5
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
SeverityHIGH
CWE CWE-287 — Improper Authentication
CISA KEV Added2026-04-20
CISA KEV Deadline2026-05-04
Known Ransomware Use ⚠️ Yes

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Required Action

CISA BOD 22-01 Deadline: 2026-05-04. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2023-03-08PaperCut releases patched versions 20.1.7, 21.2.11, and 22.0.9 (fixes CVE-2023-27351 and CVE-2023-27350)
2023-04-14Active exploitation of companion vulnerability CVE-2023-27350 begins in the wild
2023-04-19Trend Micro Zero Day Initiative publishes ZDI-23-232 advisory for CVE-2023-27351
2023-04-20CVE-2023-27351 published on NVD; PaperCut publishes urgent security bulletin
2023-04-25Public proof-of-concept exploit code circulates for related CVE-2023-27350
2026-04-20Added to CISA Known Exploited Vulnerabilities catalog with confirmed exploitation
2026-05-04CISA BOD 22-01 remediation deadline