Critical severityNVD Advisory· Published Feb 11, 2026· Updated Apr 15, 2026
CVE-2026-26215
CVE-2026-26215
Description
manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability that can lead to unauthenticated remote code execution. The FastAPI endpoints /simple_execute/{method} and /execute/{method} deserialize attacker-controlled request bodies using pickle.loads() without validation. Although a nonce-based authorization check is intended to restrict access, the nonce defaults to an empty string and the check is skipped, allowing remote attackers to execute arbitrary code in the server context by sending a crafted pickle payload.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- chocapikk.com/posts/2026/manga-image-translator-pickle-rce/nvd
- github.com/zyddnys/manga-image-translator/blob/a537cb12b41daf2065795058c2753d87e73fa0fe/manga_translator/mode/share.pynvd
- github.com/zyddnys/manga-image-translator/blob/a537cb12b41daf2065795058c2753d87e73fa0fe/manga_translator/mode/share.pynvd
- github.com/zyddnys/manga-image-translator/issues/1116nvd
- github.com/zyddnys/manga-image-translator/issues/946nvd
- www.vulncheck.com/advisories/manga-image-translator-shared-api-unsafe-deserialization-rcenvd
News mentions
0No linked articles in our index yet.