VYPR
Unrated severityNVD Advisory· Published Feb 25, 2026· Updated Feb 26, 2026

Manyfold vulnerable to OS command injection via ZIP filename in f3d render

CVE-2026-27635

Description

Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue.

Affected products

2
  • Manyfold3d/Manyfoldllm-fuzzy2 versions
    <0.133.0+ 1 more
    • (no CPE)range: <0.133.0
    • (no CPE)range: < 0.133.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.