Vulnerability Description
Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Manyfold | Manyfold | < 0.133.0 |
Related Weaknesses (CWE)
References
- https://github.com/manyfold3d/manyfold/releases/tag/v0.133.0ProductRelease Notes
- https://github.com/manyfold3d/manyfold/security/advisories/GHSA-p589-cf26-v7h2ExploitVendor Advisory
FAQ
What is CVE-2026-27635?
CVE-2026-27635 is a vulnerability with a CVSS score of 7.5 (HIGH). Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, ...
How severe is CVE-2026-27635?
CVE-2026-27635 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27635?
Check the references section above for vendor advisories and patch information. Affected products include: Manyfold Manyfold.