Description
A vulnerability was determined in zyddnys manga-image-translator up to beta-0.3. The affected element is the function to_pil_image of the file manga-image-translator-main/server/request_extraction.py of the component Translate Endpoints. This manipulation causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑side request forgery
Action: Patch
AI Analysis

Impact

Key detail from the CVE description: to_pil_image in Translate Endpoints can be manipulated to cause server‑side request forgery. This flaw allows an attacker to instruct the server to perform arbitrary HTTP requests, potentially reaching internal resources or external addresses. The vulnerability is categorized as CWE‑918, indicating that the application does not properly validate or filter user‑supplied URLs. The impact is limited to the execution of outbound network requests from the server, with no mention of remote code execution or data exfiltration in the provided documentation.

Affected Systems

The affected product is zyddnys manga‑image‑translator, with all releases up to beta‑0.3 impacted as stated in the CVE description. No specific sub‑versions are listed beyond the upper bound, so any earlier or later releases prior to the stated version boundary may need review. The vendor is the sole identified publisher in the CNA list.

Risk and Exploitability

From the provided metrics, the CVSS score of 5.3 indicates a moderate severity assessment. The EPSS score of less than 1% suggests a low overall probability of exploitation in the wild. The issue is not present in the CISA KEV catalog, implying that no large‑scale or known high‑profile attacks have been reported. Based on the description, the attack vector is remote through the Translate Endpoints API; no authentication requirement is mentioned, so the function is reachable by any client that can invoke the endpoint.

Generated by OpenCVE AI on March 17, 2026 at 17:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available update or patch that addresses the SSRF flaw in manga-image-translator.
  • If no patch exists, limit exposure of the Translate Endpoints API to trusted users or internal networks only.
  • Configure network or application firewalls to block outbound requests from the server to internal IP ranges or disallowed protocols.
  • Monitor the project's issue tracker and security advisories for any update.

Generated by OpenCVE AI on March 17, 2026 at 17:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Zyddnys
Zyddnys manga-image-translator
Vendors & Products Zyddnys
Zyddnys manga-image-translator

Wed, 11 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in zyddnys manga-image-translator up to beta-0.3. The affected element is the function to_pil_image of the file manga-image-translator-main/server/request_extraction.py of the component Translate Endpoints. This manipulation causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Title zyddnys manga-image-translator Translate Endpoints request_extraction.py to_pil_image server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Zyddnys Manga-image-translator
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T19:26:46.545Z

Reserved: 2026-03-11T12:53:55.091Z

Link: CVE-2026-3961

cve-icon Vulnrichment

Updated: 2026-03-12T19:26:40.696Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T22:16:37.410

Modified: 2026-03-12T21:07:53.427

Link: CVE-2026-3961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:48Z

Weaknesses