Home

Description

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, the set_config_value() API method (@permission(Perms.SETTINGS)) in src/pyload/core/api/__init__.py gates security-sensitive options behind a hand-maintained allowlist ADMIN_ONLY_CORE_OPTIONS. The option ("general", "ssl_verify") is not on that allowlist. Any authenticated user with the non-admin SETTINGS permission can set general.ssl_verify = off, and every subsequent outbound pycurl request is made with SSL_VERIFYPEER=0 and SSL_VERIFYHOST=0 — TLS peer and hostname verification are fully disabled. An on-path attacker can then present forged certificates for any hostname pyload fetches. This is a direct continuation of the fix family CVE-2026-33509 / CVE-2026-35463 / CVE-2026-35464 / CVE-2026-35586, each of which patched a different missed option in the same allowlist. This vulnerability is fixed in 0.5.0b3.dev100.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-295: Improper Certificate Validation

CWE-306: Missing Authentication for Critical Function

CWE-863: Incorrect Authorization

Product status

< 0.5.0b3.dev100
affected

References

github.com/...pyload/security/advisories/GHSA-ccxc-x975-4hh9 exploit

github.com/...pyload/security/advisories/GHSA-ccxc-x975-4hh9

cve.org (CVE-2026-42312)

nvd.nist.gov (CVE-2026-42312)

Download JSON