pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.
References
| Link | Resource |
|---|---|
| https://github.com/pyload/pyload/security/advisories/GHSA-6px9-j4qr-xfjw | Exploit Vendor Advisory |
Configurations
History
11 Mar 2026, 22:09
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/pyload/pyload/security/advisories/GHSA-6px9-j4qr-xfjw - Exploit, Vendor Advisory | |
| First Time |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPE | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* |
07 Mar 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-07 16:15
Updated : 2026-03-11 22:09
NVD link : CVE-2026-29778
Mitre link : CVE-2026-29778
CVE.ORG link : CVE-2026-29778
JSON object : View
Products Affected
pyload-ng_project
- pyload-ng
CWE
CWE-23
Relative Path Traversal
