CVE-2026-35586

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the ADMIN_ONLY_CORE_OPTIONS authorization set in set_config_value() uses incorrect option names ssl_cert and ssl_key, while the actual configuration option names are ssl_certfile and ssl_keyfile. This name mismatch causes the admin-only check to always evaluate to False, allowing any user with SETTINGS permission to overwrite the SSL certificate and key file paths. Additionally, the ssl_certchain option was never added to the admin-only set at all. This vulnerability is fixed in 0.5.0b3.dev97.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*

History

16 Apr 2026, 18:54

Type Values Removed Values Added
First Time Pyload-ng Project
Pyload-ng Project pyload-ng
CPE cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*
References () https://github.com/pyload/pyload/security/advisories/GHSA-ppvx-rwh9-7rj7 - () https://github.com/pyload/pyload/security/advisories/GHSA-ppvx-rwh9-7rj7 - Exploit, Vendor Advisory

07 Apr 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 17:16

Updated : 2026-04-16 18:54


NVD link : CVE-2026-35586

Mitre link : CVE-2026-35586

CVE.ORG link : CVE-2026-35586


JSON object : View

Products Affected

pyload-ng_project

  • pyload-ng
CWE
CWE-863

Incorrect Authorization