Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27933: CWE-613: Insufficient Session Expiration in manyfold3d manyfold

0
Medium
VulnerabilityCVE-2026-27933cvecve-2026-27933cwe-613
Published: Wed Feb 25 2026 (02/25/2026, 23:16:01 UTC)
Source: CVE Database V5
Vendor/Project: manyfold3d
Product: manyfold

Description

CVE-2026-27933 is a medium severity vulnerability affecting manyfold versions prior to 0. 133. 0, an open-source web application for managing 3D models. The flaw stems from insufficient session expiration, specifically cookie leakage through proxy caches, which can enable session hijacking. Exploitation requires no privileges but does require user interaction, and the attack complexity is high due to the need to intercept or access proxy cache data. The vulnerability impacts confidentiality and integrity but not availability. Although no known exploits are currently in the wild, organizations using vulnerable versions should upgrade promptly to version 0. 133. 0 or later. Countries with significant adoption of manyfold3d or active 3D printing industries are at higher risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:42:39 UTC

Technical Analysis

CVE-2026-27933 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting manyfold, an open-source, self-hosted web application designed for managing collections of 3D models with a focus on 3D printing workflows. Versions prior to 0.133.0 do not adequately expire or protect session cookies, leading to the risk of session hijacking via cookie leakage through proxy caches. Proxy caches, commonly used to improve web performance, may inadvertently store and serve session cookies to unauthorized parties if not properly configured. An attacker who can access these proxy caches or intercept cached responses may retrieve valid session cookies, allowing them to impersonate legitimate users without authentication. The CVSS v3.1 score of 6.8 reflects a medium severity, with attack vector being network-based, requiring high attack complexity, no privileges, and user interaction. The vulnerability impacts confidentiality and integrity by enabling unauthorized access to user sessions but does not affect availability. The issue was addressed in version 0.133.0 by improving session expiration and cookie handling to prevent leakage through caching mechanisms. No public exploits have been reported yet, but the risk remains for organizations running outdated versions, especially those exposing manyfold instances to the internet or using proxy caches without proper security controls.

Potential Impact

The primary impact of this vulnerability is unauthorized access to user sessions, which compromises confidentiality and integrity of sensitive data managed within manyfold, such as proprietary 3D models and design files. Attackers gaining session control can manipulate or exfiltrate 3D model data, potentially causing intellectual property theft or sabotage. Since manyfold is self-hosted, organizations with publicly accessible instances are at risk, particularly if proxy caches are misconfigured. The vulnerability does not affect system availability directly but can lead to significant operational and reputational damage if exploited. Industries relying on 3D printing for prototyping, manufacturing, or design—such as aerospace, automotive, healthcare, and consumer electronics—may face increased risk due to the sensitive nature of their 3D assets. The medium severity score indicates a moderate threat level, but the requirement for user interaction and high attack complexity somewhat limits widespread exploitation. Nonetheless, organizations ignoring this vulnerability risk targeted attacks and data breaches.

Mitigation Recommendations

Organizations should immediately upgrade manyfold installations to version 0.133.0 or later, where the vulnerability is fixed. Additionally, administrators must audit and configure proxy caches to ensure they do not store or serve session cookies; this includes setting appropriate Cache-Control headers (e.g., no-store, private) and validating cache behavior. Implementing secure cookie attributes such as HttpOnly, Secure, and SameSite can further reduce cookie exposure. Regularly reviewing session management policies to enforce short session lifetimes and automatic expiration after inactivity is critical. Network segmentation and limiting access to manyfold instances reduce exposure. Monitoring web traffic for anomalous session activity and employing web application firewalls (WAFs) with rules to detect session hijacking attempts can provide additional defense layers. Finally, educating users about phishing and social engineering risks helps mitigate the user interaction requirement for exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:11:36.688Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f8527b7ef31ef0b6936d4

Added to database: 2/25/2026, 11:26:31 PM

Last enriched: 2/25/2026, 11:42:39 PM

Last updated: 2/26/2026, 12:27:58 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats