We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54802

pyLoad CNL Blueprint is vulnerable to Path Traversal through `dlc_path` leading to Remote Code Execution (RCE)



Description

pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing unauthenticated attackers to write arbitrary files outside the designated storage directory. This can be abused to overwrite critical system files, including cron jobs and systemd services, leading to privilege escalation and remote code execution as root. This issue is fixed in version 0.5.0b3.dev90.

Reserved 2025-07-29 | Published 2025-08-05 | Updated 2025-08-05 | Assigner GitHub_M


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 0.5.0b3.dev89, < 0.5.0b3.dev90
affected

References

github.com/...pyload/security/advisories/GHSA-48rp-jc79-2264

github.com/pyload/pyload/pull/4596

github.com/...ommit/70a44fe02c03bce92337b5d370d2a45caa4de3d4

cve.org (CVE-2025-54802)

nvd.nist.gov (CVE-2025-54802)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54802

Support options

Helpdesk Chat, Email, Knowledgebase