Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6px9-j4qr-xfjw | pyLoad has an Arbitrary File Write via Path Traversal in edit_package() |
Wed, 11 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPEs | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Pyload-ng Project
Pyload-ng Project pyload-ng |
Mon, 09 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Sat, 07 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97. | |
| Title | pyLoad: Arbitrary File Write via Path Traversal in edit_package() | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T18:26:46.896Z
Reserved: 2026-03-04T16:26:02.898Z
Link: CVE-2026-29778
Updated: 2026-03-09T17:52:32.765Z
Status : Analyzed
Published: 2026-03-07T16:15:54.800
Modified: 2026-03-11T22:09:15.240
Link: CVE-2026-29778
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:15:18Z
Github GHSA