Lost in Translation: Unauthenticated RCE in Manga Image Translator
Vulnerability ID: CVE-2026-26215
CVSS Score: 9.8
Published: 2026-02-11
Translating manga is an art form. Translating arbitrary serialized Python objects into a root shell, however, is a science—specifically, the science of insecure deserialization. CVE-2026-26215 is a critical vulnerability in the manga-image-translator project that combines a classic pickle vulnerability with a hilariously broken authentication check. Because the developers relied on Python's truthiness logic for security configuration, the default installation leaves the front door wide open, allowing unauthenticated attackers to execute remote code on high-value GPU instances.
TL;DR
A logic error in the check_nonce function causes the API to skip authentication entirely in default configurations. Combined with an unsafe pickle.loads() call on the /execute endpoint, this allows unauthenticated RCE.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-502 (Deserialization of Untrusted Data)
- CVSS v3.1: 9.8 (Critical)
- Attack Vector: Network (HTTP POST)
- Authentication: None (Bypassed)
- Privileges: User/Server Context
- Status: PoC Available
Affected Systems
- manga-image-translator (Shared Mode)
- FastAPI servers using default nonce configuration
-
manga-image-translator: <= beta-0.3 (Fixed in:
N/A (See Issue #1116))
Code Analysis
Commit: N/A
Proposed patch discussion and workaround
N/A
Exploit Details
- GitHub: Full technical write-up and python exploit script.
Mitigation Strategies
- Disable 'shared' mode if not strictly necessary.
- Enforce explicit nonce generation in environment variables.
- Network isolation: Firewall port 5003 to trusted IPs only.
Remediation Steps:
- Set
MT_WEB_NONCEto a non-empty string immediately. - Apply the patch from Issue #1116 which replaces
picklewith safer serialization methods. - Monitor logs for connection attempts to
/execute/from unknown IPs.
References
Read the full report for CVE-2026-26215 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)