CVE-2026-3961
zyddnys manga-image-translator Translate Endpoints request_extraction.py to_pil_image server-side request forgery
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was determined in zyddnys manga-image-translator up to beta-0.3. The affected element is the function to_pil_image of the file manga-image-translator-main/server/request_extraction.py of the component Translate Endpoints. This manipulation causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-918 |
| Vendor | zyddnys |
| Product | manga-image-translator |
| Published | Mar 11, 2026 |
| Last Updated | Mar 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for zyddnys manga-image-translator
Be the first to know when new medium vulnerabilities affecting zyddnys manga-image-translator are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
zyddnys / manga-image-translator
beta-0.0 beta-0.1 beta-0.2 beta-0.3
References
vuldb.com: https://vuldb.com/?id.350390 vuldb.com: https://vuldb.com/?ctiid.350390 vuldb.com: https://vuldb.com/?submit.768180 vuldb.com: https://vuldb.com/?submit.768210 vuldb.com: https://vuldb.com/?submit.768211 vuldb.com: https://vuldb.com/?submit.768212 vuldb.com: https://vuldb.com/?submit.768214 vuldb.com: https://vuldb.com/?submit.768224 vuldb.com: https://vuldb.com/?submit.768225 github.com: https://github.com/zyddnys/manga-image-translator/issues/1118 github.com: https://github.com/zyddnys/manga-image-translator/issues/1119 github.com: https://github.com/zyddnys/manga-image-translator/
Credits
๐ ZAST.AI (VulDB User)