Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-97r3-5w84-r4q8 | PyLoad Vulnerable to Path Traversal via Package Folder Name |
Fri, 15 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPEs | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Pyload-ng Project
Pyload-ng Project pyload-ng |
Mon, 11 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, package folder names are sanitized using insufficient string replacement. The pattern ....// becomes .._ after replacement (partial removal), leaving .. which can be exploited when the path is later resolved by the OS. This vulnerability is fixed in 0.5.0b3.dev100. | |
| Title | pyLoad: Path Traversal via Package Folder Name | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:33:46.606Z
Reserved: 2026-04-26T12:37:18.169Z
Link: CVE-2026-42314
Updated: 2026-05-11T18:32:49.941Z
Status : Analyzed
Published: 2026-05-11T18:16:35.123
Modified: 2026-05-15T13:43:30.950
Link: CVE-2026-42314
No data.
OpenCVE Enrichment
Updated: 2026-05-11T19:45:08Z
Github GHSA