Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Manyfold
Manyfold manyfold |
|
| CPEs | cpe:2.3:a:manyfold:manyfold:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Manyfold
Manyfold manyfold |
Thu, 26 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Manyfold3d
Manyfold3d manyfold |
|
| Vendors & Products |
Manyfold3d
Manyfold3d manyfold |
Wed, 25 Feb 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue. | |
| Title | Manyfold vulnerable to OS command injection via ZIP filename in f3d render | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T16:52:18.942Z
Reserved: 2026-02-20T22:02:30.028Z
Link: CVE-2026-27635
Updated: 2026-02-26T16:52:13.769Z
Status : Analyzed
Published: 2026-02-26T00:16:24.307
Modified: 2026-02-27T18:36:30.553
Link: CVE-2026-27635
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:45:21Z