Vulnerability Description
pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is only applied to core config options, not to plugin config options. The AntiVirus plugin stores an executable path (avfile) in its config, which is passed directly to subprocess.Popen(). A non-admin user with SETTINGS permission can change this path to achieve remote code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyload-Ng Project | Pyload-Ng | <= 0.5.0b3.dev96 |
Related Weaknesses (CWE)
References
- https://github.com/pyload/pyload/commit/c4cf995a2803bdbe388addfc2b0f323277efc0e1Patch
- https://github.com/pyload/pyload/security/advisories/GHSA-w48f-wwwf-f5frExploitMitigationVendor Advisory
FAQ
What is CVE-2026-35463?
CVE-2026-35463 is a vulnerability with a CVSS score of 8.8 (HIGH). pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconne...
How severe is CVE-2026-35463?
CVE-2026-35463 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35463?
Check the references section above for vendor advisories and patch information. Affected products include: Pyload-Ng Project Pyload-Ng.