Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27635: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in manyfold3d manyfold

0
High
VulnerabilityCVE-2026-27635cvecve-2026-27635cwe-78
Published: Wed Feb 25 2026 (02/25/2026, 23:10:27 UTC)
Source: CVE Database V5
Vendor/Project: manyfold3d
Product: manyfold

Description

CVE-2026-27635 is a high-severity OS command injection vulnerability in manyfold3d's manyfold application versions prior to 0. 133. 0. It allows a logged-in user to achieve remote code execution by uploading a ZIP file containing a filename with shell metacharacters, which is unsafely passed to a Ruby backtick call during 3D model render generation. Exploitation requires low privileges but no user interaction beyond login. The vulnerability impacts confidentiality, integrity, and availability of affected systems. The issue is fixed in version 0. 133. 0. Organizations using manyfold for 3D model management should upgrade immediately and restrict upload permissions.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:40:48 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27635 affects manyfold3d's manyfold, an open-source web application designed for managing collections of 3D models, particularly for 3D printing workflows. Prior to version 0.133.0, when the model render generation feature is enabled, the application improperly sanitizes filenames within uploaded ZIP archives. Specifically, if a logged-in user uploads a ZIP file containing a file whose name includes shell metacharacters, this filename is directly passed to a Ruby backtick command execution call without proper neutralization. This leads to an OS command injection vulnerability (CWE-78), allowing the attacker to execute arbitrary commands on the underlying server with the privileges of the application process. The vulnerability requires the attacker to be authenticated (logged-in user) but does not require additional user interaction. The CVSS v3.1 base score is 7.5, reflecting high severity due to the potential for full system compromise, impacting confidentiality, integrity, and availability. The flaw is fixed in manyfold version 0.133.0 by properly sanitizing or avoiding unsafe command execution with user-supplied input. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be considered a significant risk for affected deployments.

Potential Impact

Successful exploitation of CVE-2026-27635 can lead to remote code execution on the server hosting manyfold, enabling attackers to execute arbitrary commands with the application's privileges. This can compromise sensitive 3D model data, intellectual property, and potentially allow lateral movement within the network. The attacker could disrupt service availability by executing destructive commands, modify or exfiltrate data, or install persistent backdoors. Since manyfold is used in 3D printing workflows, this could also impact manufacturing processes or product integrity. The requirement for a logged-in user limits exposure somewhat but does not eliminate risk, especially in environments with multiple users or weak authentication controls. The vulnerability affects confidentiality, integrity, and availability, making it a critical concern for organizations relying on manyfold for managing 3D assets.

Mitigation Recommendations

1. Upgrade manyfold to version 0.133.0 or later immediately to apply the official fix that sanitizes filenames and prevents command injection. 2. Restrict upload permissions to trusted users only and enforce strong authentication mechanisms to reduce the risk of malicious uploads. 3. Implement application-layer input validation and sanitization for all user-supplied data, especially filenames within uploaded archives. 4. Disable model render generation if not required, as this feature is the attack vector. 5. Employ runtime application monitoring and intrusion detection to detect anomalous command execution patterns. 6. Use containerization or sandboxing to limit the impact of potential exploitation. 7. Regularly audit logs for suspicious activity related to file uploads and command execution. 8. Educate users about secure file handling and the risks of uploading untrusted content.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.028Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f8527b7ef31ef0b6936d0

Added to database: 2/25/2026, 11:26:31 PM

Last enriched: 2/25/2026, 11:40:48 PM

Last updated: 2/26/2026, 1:29:47 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats