Medium severity6.5GHSA Advisory· Published May 11, 2026· Updated May 15, 2026
CVE-2026-42314
CVE-2026-42314
Description
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, package folder names are sanitized using insufficient string replacement. The pattern ....// becomes .._ after replacement (partial removal), leaving .. which can be exploited when the path is later resolved by the OS. This vulnerability is fixed in 0.5.0b3.dev100.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/pyload/pyload/security/advisories/GHSA-97r3-5w84-r4q8nvdExploitVendor Advisory
- github.com/advisories/GHSA-97r3-5w84-r4q8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-42314ghsa
News mentions
0No linked articles in our index yet.