Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPEs | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| Metrics |
cvssV3_1
|
Wed, 25 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Tue, 24 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is a free and open-source download manager written in Python. From version 0.4.20 to before version 0.5.0b3.dev97, the local_check decorator in pyLoad's ClickNLoad feature can be bypassed by any remote attacker through HTTP Host header spoofing. This allows unauthenticated remote users to access localhost-restricted endpoints, enabling them to inject arbitrary downloads, write files to the storage directory, and execute JavaScript code. This issue has been patched in version 0.5.0b3.dev97. | |
| Title | pyload-ng: Authentication Bypass via Host Header Injection in ClickNLoad | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-25T14:28:19.605Z
Reserved: 2026-03-20T16:59:08.890Z
Link: CVE-2026-33511
Updated: 2026-03-25T13:59:15.826Z
Status : Analyzed
Published: 2026-03-24T20:16:30.203
Modified: 2026-03-26T20:29:49.837
Link: CVE-2026-33511
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:20:41Z