High severityNVD Advisory· Published Mar 7, 2026· Updated Mar 9, 2026
pyLoad: Arbitrary File Write via Path Traversal in edit_package()
CVE-2026-29778
Description
pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pyload-ngPyPI | >= 0.5.0b3.dev13, <= 0.5.0b3.dev96 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-6px9-j4qr-xfjwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-29778ghsaADVISORY
- github.com/pyload/pyload/security/advisories/GHSA-6px9-j4qr-xfjwghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.