Vulnerability Description
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowing a user with Perms.MODIFY to specify arbitrary directories as download locations for a package. This vulnerability is fixed in 0.5.0b3.dev100.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyload-Ng Project | Pyload-Ng | < 0.5.0b3.dev100 |
Related Weaknesses (CWE)
References
- https://github.com/pyload/pyload/security/advisories/GHSA-838g-gr43-qqg9ExploitVendor Advisory
- https://github.com/pyload/pyload/security/advisories/GHSA-838g-gr43-qqg9ExploitVendor Advisory
FAQ
What is CVE-2026-42315?
CVE-2026-42315 is a vulnerability with a CVSS score of 8.1 (HIGH). pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_f...
How severe is CVE-2026-42315?
CVE-2026-42315 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42315?
Check the references section above for vendor advisories and patch information. Affected products include: Pyload-Ng Project Pyload-Ng.