CVE-2026-35586
Description
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the ADMIN_ONLY_CORE_OPTIONS authorization set in set_config_value() uses incorrect option names ssl_cert and ssl_key, while the actual configuration option names are ssl_certfile and ssl_keyfile. This name mismatch causes the admin-only check to always evaluate to False, allowing any user with SETTINGS permission to overwrite the SSL certificate and key file paths. Additionally, the ssl_certchain option was never added to the admin-only set at all. This vulnerability is fixed in 0.5.0b3.dev97.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pyload-ngPyPI | < 0.5.0b3.dev97 | 0.5.0b3.dev97 |
Affected products
1- cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*Range: <=0.5.0b3.dev96
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/pyload/pyload/security/advisories/GHSA-ppvx-rwh9-7rj7nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-ppvx-rwh9-7rj7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-35586ghsaADVISORY
News mentions
0No linked articles in our index yet.