CVE-2026-27635 PUBLISHED

Manyfold vulnerable to OS command injection via ZIP filename in f3d render

Assigner: GitHub_M
Reserved: 20.02.2026 Published: 25.02.2026 Updated: 25.02.2026

Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.5

Product Status

Vendor manyfold3d
Product manyfold
Versions
  • Version < 0.133.0 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE