Description
Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Versions prior to 0.133.0 are vulnerable to session hijack via cookie leakage in proxy caches. Version 0.133.0 fixes the issue.
Published: 2026-02-25
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized session hijack due to cookie leakage
Action: Immediate Patch
AI Analysis

Impact

Manyfold is an open‑source web application for managing 3D models. Versions prior to 0.133.0 allow an attacker to hijack a user session because authentication cookies are written to proxy cache entries that are shared among clients. The vulnerability is a session cookie leakage problem, classified as CWE‑613, enabling an attacker to impersonate an authenticated user and gain unauthorized access to the application and potentially its underlying data.

Affected Systems

The affected product is Manyfold 3D, the self‑hosted web application from manyfold3d. All releases earlier than 0.133.0 are vulnerable; the fix was released in version 0.133.0. Users running any of these prior versions are susceptible. No other vendor or product is listed.

Risk and Exploitability

The CVSS score of 6.8 indicates moderate severity, but the EPSS score of less than 1% suggests that real‑world exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog, highlighting its low exploitation footprint. An attacker would need to send or intercept responses through a shared proxy cache that stores session cookies, or target a tenant in a multitenant environment exposed behind such a cache. If successful, the attacker could impersonate a legitimate user and access sensitive data or perform actions on behalf of that user.

Generated by OpenCVE AI on April 17, 2026 at 14:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Manyfold to version 0.133.0 or later. This release includes the fix for session cookie leakage.
  • Configure any reverse proxies, CDN, or caching layers to prevent the storage of session cookies. This can be done by setting appropriate Cache‑Control headers, disabling caching for authenticated traffic, or marking the session cookie with the Secure and SameSite attributes so it is not cached.
  • Enable the Secure, HttpOnly, and SameSite cookie flags in Manyfold’s configuration. Additionally, monitor log files for unusual or unauthorized session activity and consider implementing IP whitelisting or two‑factor authentication for highly privileged accounts.

Generated by OpenCVE AI on April 17, 2026 at 14:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Manyfold
Manyfold manyfold
CPEs cpe:2.3:a:manyfold:manyfold:*:*:*:*:*:*:*:*
Vendors & Products Manyfold
Manyfold manyfold

Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Manyfold3d
Manyfold3d manyfold
Vendors & Products Manyfold3d
Manyfold3d manyfold

Wed, 25 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description Manyfold is an open source, self-hosted web application for managing a collection of 3d models, particularly focused on 3d printing. Versions prior to 0.133.0 are vulnerable to session hijack via cookie leakage in proxy caches. Version 0.133.0 fixes the issue.
Title Manyfold vulnerable to session hijack via cookie leakage in proxy caches
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Manyfold Manyfold
Manyfold3d Manyfold
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T16:45:33.523Z

Reserved: 2026-02-25T03:11:36.688Z

Link: CVE-2026-27933

cve-icon Vulnrichment

Updated: 2026-02-26T16:45:27.724Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T00:16:26.973

Modified: 2026-02-27T17:27:19.060

Link: CVE-2026-27933

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:45:21Z

Weaknesses