pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the ADMIN_ONLY_CORE_OPTIONS authorization set in set_config_value() uses incorrect option names ssl_cert and ssl_key, while the actual configuration option names are ssl_certfile and ssl_keyfile. This name mismatch causes the admin-only check to always evaluate to False, allowing any user with SETTINGS permission to overwrite the SSL certificate and key file paths. Additionally, the ssl_certchain option was never added to the admin-only set at all. This vulnerability is fixed in 0.5.0b3.dev97.
References
| Link | Resource |
|---|---|
| https://github.com/pyload/pyload/security/advisories/GHSA-ppvx-rwh9-7rj7 | Exploit Vendor Advisory |
Configurations
History
16 Apr 2026, 18:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPE | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* | |
| References | () https://github.com/pyload/pyload/security/advisories/GHSA-ppvx-rwh9-7rj7 - Exploit, Vendor Advisory |
07 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 17:16
Updated : 2026-04-16 18:54
NVD link : CVE-2026-35586
Mitre link : CVE-2026-35586
CVE.ORG link : CVE-2026-35586
JSON object : View
Products Affected
pyload-ng_project
- pyload-ng
CWE
CWE-863
Incorrect Authorization
