Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Prior to version 0.133.0, when model render generation is enabled, a logged-in user can achieve RCE by uploading a ZIP containing a file with a shell metacharacter in its name. The filename reaches a Ruby backtick call unsanitized. Version 0.133.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/manyfold3d/manyfold/releases/tag/v0.133.0 | Product Release Notes |
| https://github.com/manyfold3d/manyfold/security/advisories/GHSA-p589-cf26-v7h2 | Exploit Vendor Advisory |
Configurations
History
27 Feb 2026, 18:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:manyfold:manyfold:*:*:*:*:*:*:*:* | |
| First Time |
Manyfold manyfold
Manyfold |
|
| References | () https://github.com/manyfold3d/manyfold/releases/tag/v0.133.0 - Product, Release Notes | |
| References | () https://github.com/manyfold3d/manyfold/security/advisories/GHSA-p589-cf26-v7h2 - Exploit, Vendor Advisory |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 00:16
Updated : 2026-02-27 18:36
NVD link : CVE-2026-27635
Mitre link : CVE-2026-27635
CVE.ORG link : CVE-2026-27635
JSON object : View
Products Affected
manyfold
- manyfold
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
