CVE-2026-29778
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to manipulate file paths in the pyLoad download manager, potentially accessing unauthorized files on the server. It occurs in specific versions of the software when the attacker crafts special input to bypass basic security checks, so users should upgrade to the latest version to protect against this risk.
Technical Description
pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
pyload-ng project
Product
pyload-ng