Ad

CVE-2026-33314

MEDIUM CVSS 3.1: 6.5 EPSS 0.01%
Updated Mar 26, 2026
Pyload-Ng_Project
Parameter Value
CVSS 6.5 (MEDIUM)
Affected Versions before 0.5.0b3.dev97
Fixed In 0.5.0
Type CWE-346 (Origin Validation Error), CWE-287 (Improper Authentication)
Vendor Pyload-Ng_Project
Public PoC No

pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, a Host Header Spoofing vulnerability in the @local_check decorator allows unauthenticated external attackers to bypass local-only restrictions. This grants access to the Click'N'Load API endpoints, enabling attackers to remotely queue arbitrary downloads, leading to Server-Side Request Forgery (SSRF) and Denial of Service (DoS).

This issue has been patched in version 0.5.0b3.dev97.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
Low
Partial disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Pyload-Ng_Project Pyload-Ng
cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*
0.5.0b3.dev97