Description
manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability that can lead to unauthenticated remote code execution. The FastAPI endpoints /simple_execute/{method} and /execute/{method} deserialize attacker-controlled request bodies using pickle.loads() without validation. Although a nonce-based authorization check is intended to restrict access, the nonce defaults to an empty string and the check is skipped, allowing remote attackers to execute arbitrary code in the server context by sending a crafted pickle payload.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
Any version
Credits
Valentin Lobstein (Chocapikk)
sud0why of Tencent YunDing Security Lab
References
chocapikk.com/posts/2026/manga-image-translator-pickle-rce/
github.com/zyddnys/manga-image-translator/issues/1116
github.com/zyddnys/manga-image-translator/issues/946
github.com/...2753d87e73fa0fe/manga_translator/mode/share.py
github.com/...2753d87e73fa0fe/manga_translator/mode/share.py
www.vulncheck.com/...r-shared-api-unsafe-deserialization-rce