Moderate severityNVD Advisory· Published Mar 24, 2026· Updated Mar 26, 2026
pyload-ng: Improper Authentication and Origin Validation Error
CVE-2026-33314
Description
pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, a Host Header Spoofing vulnerability in the @local_check decorator allows unauthenticated external attackers to bypass local-only restrictions. This grants access to the Click'N'Load API endpoints, enabling attackers to remotely queue arbitrary downloads, leading to Server-Side Request Forgery (SSRF) and Denial of Service (DoS). This issue has been patched in version 0.5.0b3.dev97.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pyload-ngPyPI | < 0.5.0b3.dev97 | 0.5.0b3.dev97 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-q485-cg9q-xq2rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33314ghsaADVISORY
- github.com/pyload/pyload/security/advisories/GHSA-q485-cg9q-xq2rghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.