Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0154 | pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade. |
Github GHSA |
GHSA-pgpj-v85q-h5fm | Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation |
Wed, 18 Jun 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-17T21:19:19.773Z
Reserved: 2024-01-10T15:09:55.552Z
Link: CVE-2024-22416
Updated: 2024-08-01T22:43:34.922Z
Status : Modified
Published: 2024-01-18T00:15:38.397
Modified: 2024-11-21T08:56:14.540
Link: CVE-2024-22416
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA