Ad

CVE-2026-32808

HIGH CVSS 3.1: 8.1 EPSS 0.09%
Updated Mar 26, 2026
Python
Parameter Value
CVSS 8.1 (HIGH)
Affected Versions 0.5.0a5.dev528 — 0.5.0b3.dev97
Fixed In 0.5.0
Type CWE-22 (Path Traversal)
Vendor Python
Public PoC No

pyLoad is a free and open-source download manager written in Python. Versions before 0.5.0b3.dev97 are vulnerable to path traversal during password verification of certain encrypted 7z archives (encrypted files with non-encrypted headers), causing arbitrary file deletion outside of the extraction directory. During password verification, pyLoad derives an archive entry name from 7z listing output and treats it as a filesystem path without constraining it to the extraction directory.

This issue has been fixed in version 0.5.0b3.dev97.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 2

Configuration From (including) Up to (excluding)
Pyload Pyload
cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
<= 0.4.20
Pyload-Ng_Project Pyload-Ng
cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*
0.5.0a5.dev528 0.5.0b3.dev97