CVE-2026-33992

pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*

History

31 Mar 2026, 14:49

Type Values Removed Values Added
First Time Pyload
Pyload pyload
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*
References () https://github.com/pyload/pyload/commit/b76b6d4ee5e32d2118d26afdee1d0a9e57d4bfe8 - () https://github.com/pyload/pyload/commit/b76b6d4ee5e32d2118d26afdee1d0a9e57d4bfe8 - Patch
References () https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x - () https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x - Exploit, Vendor Advisory

30 Mar 2026, 19:16

Type Values Removed Values Added
References () https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x - () https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x -

27 Mar 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 23:17

Updated : 2026-03-31 14:49


NVD link : CVE-2026-33992

Mitre link : CVE-2026-33992

CVE.ORG link : CVE-2026-33992


JSON object : View

Products Affected

pyload

  • pyload
CWE
CWE-918

Server-Side Request Forgery (SSRF)