Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7gvf-3w72-p2pg | pyLoad: SSRF filter bypass via HTTP redirect in BaseDownloader (Incomplete fix for CVE-2026-33992) |
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPEs | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Pyload-ng Project
Pyload-ng Project pyload-ng |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, pyLoad has a server-side request forgery (SSRF) vulnerability. The fix for CVE-2026-33992 added IP validation to BaseDownloader.download() that checks the hostname of the initial download URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, causing it to automatically follow HTTP redirects. Redirect targets are never validated against the SSRF filter. An authenticated user with ADD permission can bypass the SSRF fix by submitting a URL that redirects to an internal address. | |
| Title | pyLoad has SSRF fix bypass via HTTP redirect | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T19:29:49.223Z
Reserved: 2026-04-02T19:25:52.193Z
Link: CVE-2026-35459
Updated: 2026-04-07T19:29:44.661Z
Status : Analyzed
Published: 2026-04-06T20:16:28.220
Modified: 2026-04-20T17:01:15.083
Link: CVE-2026-35459
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:37:25Z
Github GHSA