Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24185 | PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter |
Github GHSA |
GHSA-pwh4-6r3m-j2rf | PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter |
Tue, 12 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Aug 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Mon, 11 Aug 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issue has been patched in version 0.5.0b3.dev91. | |
| Title | PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-12T15:49:56.057Z
Reserved: 2025-08-07T18:27:23.306Z
Link: CVE-2025-55156
Updated: 2025-08-12T15:49:51.562Z
Status : Deferred
Published: 2025-08-11T23:15:26.850
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-55156
No data.
OpenCVE Enrichment
Updated: 2025-08-12T07:41:41Z
EUVD
Github GHSA