- **CVE ID:** CVE-2026-26215 - **Exploit Type:** Shared API Unsafe Deserialization RCE - **Affected Software:** manga-image-translator <= beta-0.3 - **Severity:** Critical - **CVSS v4 Vector:** CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N - **Description:** - The FastAPI endpoints `/simple_execute/{method}` and `/execute/{method}` deserialize attacker-controlled request bodies using `pickle.loads()` without any validation. - A nonce-based authorization check is implemented to restrict access, but the nonce defaults to an empty string, rendering the check ineffective. - This allows remote attackers to execute arbitrary code in the server context by crafting and sending a malicious pickle payload. - **References:** - Researcher Blog and PoC - GitHub Issue with Proposed Fix - Original GitHub Issue - Vulnerable Code L112 - Vulnerable Code L130 - **Credit:** - Valentin Lobstein (Chocapikk) - sud0why of Tencent YunDing Security Lab