Home

Description

pyLoad is a free and open-source download manager written in Python. From version 0.4.20 to before version 0.5.0b3.dev97, the local_check decorator in pyLoad's ClickNLoad feature can be bypassed by any remote attacker through HTTP Host header spoofing. This allows unauthenticated remote users to access localhost-restricted endpoints, enabling them to inject arbitrary downloads, write files to the storage directory, and execute JavaScript code. This issue has been patched in version 0.5.0b3.dev97.

PUBLISHED Reserved 2026-03-20 | Published 2026-03-24 | Updated 2026-03-25 | Assigner GitHub_M




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:L/SA:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

>= 0.4.20, < 0.5.0b3.dev97
affected

References

github.com/...pyload/security/advisories/GHSA-g5j2-gxqh-x7pw exploit

github.com/...pyload/security/advisories/GHSA-g5j2-gxqh-x7pw

cve.org (CVE-2026-33511)

nvd.nist.gov (CVE-2026-33511)

Download JSON