pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/pyload/pyload/commit/b76b6d4ee5e32d2118d26afdee1d0a9e57d4bfe8 | Patch |
| https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x | Exploit Vendor Advisory |
| https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x | Exploit Vendor Advisory |
Configurations
History
31 Mar 2026, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pyload
Pyload pyload |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:* | |
| References | () https://github.com/pyload/pyload/commit/b76b6d4ee5e32d2118d26afdee1d0a9e57d4bfe8 - Patch | |
| References | () https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x - Exploit, Vendor Advisory |
30 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x - |
27 Mar 2026, 23:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 23:17
Updated : 2026-03-31 14:49
NVD link : CVE-2026-33992
Mitre link : CVE-2026-33992
CVE.ORG link : CVE-2026-33992
JSON object : View
Products Affected
pyload
- pyload
CWE
CWE-918
Server-Side Request Forgery (SSRF)
