CVE-2026-40071

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the /json/package_order, /json/link_order, and /json/abort_link WebUI JSON endpoints enforce weaker permissions than the core API methods they invoke. This allows authenticated low-privileged users to execute MODIFY operations that should be denied by pyLoad's own permission model. This vulnerability is fixed in 0.5.0b3.dev97.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*

History

28 Apr 2026, 00:53

Type Values Removed Values Added
References () https://github.com/pyload/pyload/security/advisories/GHSA-rfgh-63mg-8pwm - () https://github.com/pyload/pyload/security/advisories/GHSA-rfgh-63mg-8pwm - Exploit, Vendor Advisory
CPE cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
First Time Pyload
Pyload pyload

10 Apr 2026, 15:16

Type Values Removed Values Added
References () https://github.com/pyload/pyload/security/advisories/GHSA-rfgh-63mg-8pwm - () https://github.com/pyload/pyload/security/advisories/GHSA-rfgh-63mg-8pwm -

09 Apr 2026, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 18:17

Updated : 2026-04-28 00:53


NVD link : CVE-2026-40071

Mitre link : CVE-2026-40071

CVE.ORG link : CVE-2026-40071


JSON object : View

Products Affected

pyload

  • pyload
CWE
CWE-863

Incorrect Authorization