PyPI package
pyload-ng
pkg:pypi/pyload-ng
Vulnerabilities (43)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-61773 | Hig | 8.1 | < 0.5.0b3.dev91 | 0.5.0b3.dev91 | Oct 9, 2025 | pyLoad is a free and open-source download manager written in Python. In versions prior to 0.5.0b3.dev91, pyLoad web interface contained insufficient input validation in both the Captcha script endpoint and the Click'N'Load (CNL) Blueprint. This flaw allowed untrusted user input t | |
| CVE-2025-57751 | Hig | — | < 0.5.0b3.dev92 | 0.5.0b3.dev92 | Aug 21, 2025 | pyLoad is the free and open-source Download Manager written in pure Python. The jk parameter is received in pyLoad CNL Blueprint. Due to the lack of jk parameter verification, the jk parameter input by the user is directly determined as dykpy.evaljs(), resulting in the server CPU | |
| CVE-2025-55156 | Hig | — | < 0.5.0b3.dev91 | 0.5.0b3.dev91 | Aug 11, 2025 | pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issu | |
| CVE-2025-54802 | — | < 0.5.0b3.dev90 | 0.5.0b3.dev90 | Aug 5, 2025 | pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). | ||
| CVE-2025-54140 | Hig | 7.5 | >= 0.5.0b3.dev89, < 0.5.0b3.dev90 | 0.5.0b3.dev90 | Jul 22, 2025 | pyLoad is a free and open-source Download Manager written in pure Python. In version 0.5.0b3.dev89, an authenticated path traversal vulnerability exists in the /json/upload endpoint of pyLoad. By manipulating the filename of an uploaded file, an attacker can traverse out of the i | |
| CVE-2025-53890 | Cri | 9.8 | < 0.20 | 0.20 | Jul 15, 2025 | pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploita | |
| CVE-2025-7346 | Hig | — | <= 0.5.0b3.dev88 | — | Jul 8, 2025 | Any unauthenticated attacker can bypass the localhost restrictions posed by the application and utilize this to create arbitrary packages | |
| CVE-2024-39205 | Cri | 9.8 | <= 0.5.0b3.dev85 | — | Oct 28, 2024 | An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request. | |
| CVE-2024-47821 | — | < 0.5.0b3.dev87 | 0.5.0b3.dev87 | Oct 25, 2024 | pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the respective action, remote co | ||
| CVE-2024-32880 | — | <= 0.5.0 | — | Apr 26, 2024 | pyload is an open-source Download Manager written in pure Python. An authenticated user can change the download folder and upload a crafted template to the specified folder lead to remote code execution. There is no fix available at the time of publication. | ||
| CVE-2024-24808 | — | < 0.5.0b3.dev79 | 0.5.0b3.dev79 | Feb 6, 2024 | pyLoad is an open-source Download Manager written in pure Python. There is an open redirect vulnerability due to incorrect validation of input values when redirecting users after login. pyLoad is validating URLs via the `get_redirect_url` function when redirecting users at login. | ||
| CVE-2024-22416 | — | < 0.5.0b3.dev78 | 0.5.0b3.dev78 | Jan 17, 2024 | pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Reque | ||
| CVE-2024-21644 | — | < 0.5.0b3.dev77 | 0.5.0b3.dev77 | Jan 8, 2024 | pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77. | ||
| CVE-2024-21645 | — | < 0.5.0b3.dev77 | 0.5.0b3.dev77 | Jan 8, 2024 | pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be | ||
| CVE-2023-47890 | — | < 0.5.0b3.dev75 | 0.5.0b3.dev75 | Jan 8, 2024 | pyLoad 0.5.0 is vulnerable to Unrestricted File Upload. | ||
| CVE-2023-0509 | — | < 0.5.0b3.dev44 | 0.5.0b3.dev44 | Jan 26, 2023 | Improper Certificate Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev44. | ||
| CVE-2023-0488 | — | < 0.5.0b3.dev42 | 0.5.0b3.dev42 | Jan 26, 2023 | Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42. | ||
| CVE-2023-0435 | — | < 0.5.0b3.dev41 | 0.5.0b3.dev41 | Jan 22, 2023 | Excessive Attack Surface in GitHub repository pyload/pyload prior to 0.5.0b3.dev41. | ||
| CVE-2023-0434 | — | < 0.5.0b3.dev40 | 0.5.0b3.dev40 | Jan 22, 2023 | Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40. | ||
| CVE-2023-0297 | — | < 0.5.0b3.dev31 | 0.5.0b3.dev31 | Jan 14, 2023 | Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31. |
- affected < 0.5.0b3.dev91fixed 0.5.0b3.dev91
pyLoad is a free and open-source download manager written in Python. In versions prior to 0.5.0b3.dev91, pyLoad web interface contained insufficient input validation in both the Captcha script endpoint and the Click'N'Load (CNL) Blueprint. This flaw allowed untrusted user input t
- affected < 0.5.0b3.dev92fixed 0.5.0b3.dev92
pyLoad is the free and open-source Download Manager written in pure Python. The jk parameter is received in pyLoad CNL Blueprint. Due to the lack of jk parameter verification, the jk parameter input by the user is directly determined as dykpy.evaljs(), resulting in the server CPU
- affected < 0.5.0b3.dev91fixed 0.5.0b3.dev91
pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issu
- CVE-2025-54802Aug 5, 2025affected < 0.5.0b3.dev90fixed 0.5.0b3.dev90
pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE).
- affected >= 0.5.0b3.dev89, < 0.5.0b3.dev90fixed 0.5.0b3.dev90
pyLoad is a free and open-source Download Manager written in pure Python. In version 0.5.0b3.dev89, an authenticated path traversal vulnerability exists in the /json/upload endpoint of pyLoad. By manipulating the filename of an uploaded file, an attacker can traverse out of the i
- affected < 0.20fixed 0.20
pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploita
- affected <= 0.5.0b3.dev88
Any unauthenticated attacker can bypass the localhost restrictions posed by the application and utilize this to create arbitrary packages
- affected <= 0.5.0b3.dev85
An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request.
- CVE-2024-47821Oct 25, 2024affected < 0.5.0b3.dev87fixed 0.5.0b3.dev87
pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the respective action, remote co
- CVE-2024-32880Apr 26, 2024affected <= 0.5.0
pyload is an open-source Download Manager written in pure Python. An authenticated user can change the download folder and upload a crafted template to the specified folder lead to remote code execution. There is no fix available at the time of publication.
- CVE-2024-24808Feb 6, 2024affected < 0.5.0b3.dev79fixed 0.5.0b3.dev79
pyLoad is an open-source Download Manager written in pure Python. There is an open redirect vulnerability due to incorrect validation of input values when redirecting users after login. pyLoad is validating URLs via the `get_redirect_url` function when redirecting users at login.
- CVE-2024-22416Jan 17, 2024affected < 0.5.0b3.dev78fixed 0.5.0b3.dev78
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Reque
- CVE-2024-21644Jan 8, 2024affected < 0.5.0b3.dev77fixed 0.5.0b3.dev77
pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.
- CVE-2024-21645Jan 8, 2024affected < 0.5.0b3.dev77fixed 0.5.0b3.dev77
pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be
- CVE-2023-47890Jan 8, 2024affected < 0.5.0b3.dev75fixed 0.5.0b3.dev75
pyLoad 0.5.0 is vulnerable to Unrestricted File Upload.
- CVE-2023-0509Jan 26, 2023affected < 0.5.0b3.dev44fixed 0.5.0b3.dev44
Improper Certificate Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev44.
- CVE-2023-0488Jan 26, 2023affected < 0.5.0b3.dev42fixed 0.5.0b3.dev42
Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.
- CVE-2023-0435Jan 22, 2023affected < 0.5.0b3.dev41fixed 0.5.0b3.dev41
Excessive Attack Surface in GitHub repository pyload/pyload prior to 0.5.0b3.dev41.
- CVE-2023-0434Jan 22, 2023affected < 0.5.0b3.dev40fixed 0.5.0b3.dev40
Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40.
- CVE-2023-0297Jan 14, 2023affected < 0.5.0b3.dev31fixed 0.5.0b3.dev31
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
Page 2 of 3