Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c3gc-9pf2-84gg | PyLoad vulnerable to unauthenticated traceback disclosure via global exception handler in WebUI |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, pyload-ng WebUI returns full Python traceback details to clients on unhandled exceptions. Because /web/<path:filename> is reachable without authentication and renders attacker-controlled template names, an unauthenticated user can reliably trigger a server exception (for example by requesting a non-existent template) and receive internal stack traces in the HTTP response. This vulnerability is fixed in 0.5.0b3.dev100. | |
| Title | pyLoad: Unauthenticated traceback disclosure via global exception handler in WebUI | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:27:05.705Z
Reserved: 2026-05-05T15:42:40.518Z
Link: CVE-2026-44226
Updated: 2026-05-11T18:26:59.566Z
Status : Awaiting Analysis
Published: 2026-05-11T18:16:37.807
Modified: 2026-05-13T17:26:28.013
Link: CVE-2026-44226
No data.
OpenCVE Enrichment
Updated: 2026-05-11T18:45:25Z
Github GHSA