Impact
Manyfold’s vulnerability is an operating system command injection that occurs when a ZIP file containing a file with a shell metacharacter in its name is uploaded. The filename is fed directly into a Ruby backtick call without sanitization, allowing an attacker to execute arbitrary shell commands in the rendering backend. This flaw is classified as CWE‑78 and gives the attacker remote code execution privileges once the model render generation feature is enabled.
Affected Systems
All installations of Manyfold before version 0.133.0 are impacted. The application is a self‑hosted web service provided by manyfold3d, and any system that allows authenticated users to upload model render ZIP archives is vulnerable. Version 0.133.0 and later contain the fix.
Risk and Exploitability
The CVSS base score of 7.5 reflects a serious risk, but the EPSS score is below 1%, indicating that the exploitation probability remains low at present. The issue is not listed in the CISA Known Exploited Vulnerabilities catalog. Attack requires authentication and the use of the render feature; an attacker can craft a ZIP containing a malicious filename such as ;id; to trigger command execution during rendering.
OpenCVE Enrichment