Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2wvg-62qm-gj33 | pyLoad: SSRF in parse_urls API endpoint via unvalidated URL parameter |
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPEs | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Pyload-ng Project
Pyload-ng Project pyload-ng |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validation, protocol restriction, or IP blacklist. An authenticated user with ADD permission can make HTTP/HTTPS requests to internal network resources and cloud metadata endpoints, read local files via file:// protocol (pycurl reads the file server-side), interact with internal services via gopher:// and dict:// protocols, and enumerate file existence via error-based oracle (error 37 vs empty response). | |
| Title | pyLoad has SSRF in parse_urls API endpoint via unvalidated URL parameter | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:03:28.344Z
Reserved: 2026-04-01T17:26:21.134Z
Link: CVE-2026-35187
Updated: 2026-04-07T14:03:20.363Z
Status : Analyzed
Published: 2026-04-06T20:16:27.207
Modified: 2026-04-20T17:05:58.587
Link: CVE-2026-35187
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:37:26Z
Github GHSA