← Volver a CVEs
CVE-2026-33511
CRITICAL9.8
Descripcion
pyLoad is a free and open-source download manager written in Python. From version 0.4.20 to before version 0.5.0b3.dev97, the local_check decorator in pyLoad's ClickNLoad feature can be bypassed by any remote attacker through HTTP Host header spoofing. This allows unauthenticated remote users to access localhost-restricted endpoints, enabling them to inject arbitrary downloads, write files to the storage directory, and execute JavaScript code. This issue has been patched in version 0.5.0b3.dev97.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/24/2026
Ultima modificacion3/26/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
pyload-ng_project:pyload-ngpyload:pyload
Debilidades (CWE)
CWE-639
Referencias
https://github.com/pyload/pyload/security/advisories/GHSA-g5j2-gxqh-x7pw(security-advisories@github.com)
https://github.com/pyload/pyload/security/advisories/GHSA-g5j2-gxqh-x7pw(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.