Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/manyfold3d/manyfold/releases/tag/v0.133.0 | Product Release Notes |
| https://github.com/manyfold3d/manyfold/security/advisories/GHSA-p589-cf26-v7h2 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-26 00:16
Updated : 2026-02-27 18:36
NVD link : CVE-2026-27635
Mitre link : CVE-2026-27635
CVE.ORG link : CVE-2026-27635
JSON object : View
Products Affected
manyfold
- manyfold
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
