CVE-2026-27933

6.8 MEDIUM

📋 TL;DR

Manyfold versions before 0.133.0 are vulnerable to session hijacking due to cookie leakage in proxy caches. This allows attackers to steal user sessions and impersonate legitimate users. All self-hosted Manyfold instances using affected versions are impacted.

💻 Affected Systems

Products:
  • Manyfold
Versions: All versions prior to 0.133.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments behind proxy caches that don't properly handle session cookies. Direct deployments without proxies are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the Manyfold instance, allowing them to delete or modify 3D models, access sensitive user data, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized users gain access to other users' 3D model collections and can download, modify, or delete models without permission.

🟢

If Mitigated

With proper proxy cache controls and network segmentation, impact is limited to potential information disclosure of session tokens without actual session takeover.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to proxy cache logs or the ability to intercept cached responses. No authentication needed to attempt exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.133.0

Vendor Advisory: https://github.com/manyfold3d/manyfold/security/advisories/GHSA-g949-hmvj-2r76

Restart Required: Yes

Instructions:

1. Backup your Manyfold data and configuration. 2. Stop the Manyfold service. 3. Update to version 0.133.0 using your package manager or by downloading from GitHub releases. 4. Restart the Manyfold service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Configure proxy cache to exclude session cookies

all

Configure your reverse proxy (nginx, Apache, etc.) to not cache responses containing session cookies

# For nginx: add 'proxy_cache_bypass $cookie_sessionid;' to location block
# For Apache: use mod_cache with CacheIgnoreHeaders Set-Cookie

Disable proxy caching for Manyfold

all

Temporarily disable caching for the Manyfold application at the proxy level

# For nginx: add 'proxy_cache off;' to location block
# For Apache: disable mod_cache for Manyfold paths

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Manyfold instance from untrusted networks
  • Deploy WAF rules to detect and block session hijacking attempts

🔍 How to Verify

Check if Vulnerable:

Check your Manyfold version. If it's below 0.133.0 and you're using a proxy cache, you are vulnerable.

Check Version:

Check the Manyfold web interface admin panel or run 'manyfold --version' if using CLI

Verify Fix Applied:

After updating to 0.133.0, verify that session cookies are marked with 'Cache-Control: private' and 'Set-Cookie' headers are not being cached by your proxy.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from different IPs with same session ID
  • Unusual access patterns to user-specific endpoints

Network Indicators:

  • Requests with stolen session cookies from unexpected source IPs
  • Cache hits on responses containing Set-Cookie headers

SIEM Query:

source="manyfold.log" AND ("session hijack" OR "multiple sessions" OR "unusual login location")

🔗 References

📤 Share & Export