Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27635: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in manyfold3d manyfold

0
High
VulnerabilityCVE-2026-27635cvecve-2026-27635cwe-78
Published: Wed Feb 25 2026 (02/25/2026, 23:10:27 UTC)
Source: CVE Database V5
Vendor/Project: manyfold3d
Product: manyfold

Description

Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:07:25 UTC

Technical Analysis

CVE-2026-27635 is an OS command injection vulnerability identified in manyfold, a self-hosted web application designed to manage collections of 3D models, especially for 3D printing workflows. The vulnerability exists in versions prior to 0.133.0 when the model render generation feature is enabled. Specifically, the issue stems from improper sanitization of filenames within uploaded ZIP archives. When a logged-in user uploads a ZIP file containing a file whose name includes shell metacharacters, this filename is passed directly to a Ruby backtick execution call without neutralization. This allows the attacker to inject arbitrary shell commands, leading to remote code execution (RCE) on the server hosting manyfold. Exploitation requires the attacker to be authenticated, but no additional user interaction is necessary beyond uploading the malicious ZIP. The vulnerability affects confidentiality, integrity, and availability by enabling attackers to execute arbitrary commands, potentially compromising the entire server environment. The vulnerability was assigned CVE-2026-27635 and has a CVSS 3.1 base score of 7.5, indicating high severity. The issue was addressed and fixed in manyfold version 0.133.0 by properly sanitizing input filenames before execution. No known exploits in the wild have been reported yet. This vulnerability highlights the risks of unsanitized input in command execution contexts, especially in web applications handling user-uploaded files.

Potential Impact

This vulnerability allows authenticated users to execute arbitrary commands on the server running manyfold, potentially leading to full system compromise. Attackers could steal sensitive data, modify or delete 3D model files, disrupt service availability, or use the compromised server as a foothold for further attacks within an organization’s network. Given manyfold’s role in managing 3D printing models, intellectual property related to product designs or prototypes could be exposed or altered. The impact extends to operational disruption if attackers deploy ransomware or other destructive payloads. Since exploitation requires authentication, insider threats or compromised user accounts pose significant risks. Organizations relying on manyfold for managing 3D assets, especially in manufacturing, prototyping, or research sectors, face heightened exposure. The vulnerability’s presence in open-source software also means that many smaller organizations or hobbyist groups using self-hosted instances may be vulnerable, increasing the overall attack surface.

Mitigation Recommendations

The primary mitigation is to upgrade all manyfold instances to version 0.133.0 or later, where the vulnerability is fixed. Until upgrade, organizations should disable the model render generation feature if feasible to reduce risk. Implement strict access controls to limit who can upload files, ensuring only trusted users have upload permissions. Employ network segmentation to isolate manyfold servers from critical infrastructure. Monitor logs for suspicious upload activity or command execution attempts. Use application-level firewalls or runtime application self-protection (RASP) tools to detect and block command injection patterns. Conduct regular audits of user accounts and enforce strong authentication mechanisms to reduce risk from compromised credentials. Additionally, consider sandboxing or containerizing manyfold instances to limit the blast radius of potential exploitation. Educate users about the risks of uploading untrusted files and maintain up-to-date backups to recover from potential attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.028Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f8527b7ef31ef0b6936d0

Added to database: 2/25/2026, 11:26:31 PM

Last enriched: 3/5/2026, 11:07:25 AM

Last updated: 4/12/2026, 4:12:59 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses