๐Ÿ” CVE Alert

CVE-2026-27635

HIGH 7.5

Manyfold vulnerable to OS command injection via ZIP filename in f3d render

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue.

CWE CWE-78
Vendor manyfold3d
Product manyfold
Published Feb 25, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for manyfold3d manyfold

Be the first to know when new high vulnerabilities affecting manyfold3d manyfold are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

manyfold3d / manyfold
< 0.133.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/manyfold3d/manyfold/security/advisories/GHSA-p589-cf26-v7h2 github.com: https://github.com/manyfold3d/manyfold/releases/tag/v0.133.0