pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev98, the set_session_cookie_secure before_request handler in src/pyload/webui/app/__init__.py reads the X-Forwarded-Proto header from any HTTP request without validating that the request originates from a trusted proxy, then mutates the global Flask configuration SESSION_COOKIE_SECURE on every request. Because pyLoad uses the multi-threaded Cheroot WSGI server (request_queue_size=512), this creates a race condition where an attacker's request can influence the Secure flag on other users' session cookies — either downgrading cookie security behind a TLS proxy or causing a session denial-of-service on plain HTTP deployments. This vulnerability is fixed in 0.5.0b3.dev98.
References
| Link | Resource |
|---|---|
| https://github.com/pyload/pyload/security/advisories/GHSA-mp82-fmj6-f22v | Exploit Mitigation Vendor Advisory |
| https://github.com/pyload/pyload/security/advisories/GHSA-mp82-fmj6-f22v | Exploit Mitigation Vendor Advisory |
Configurations
History
27 Apr 2026, 19:43
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* | |
| First Time |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| References | () https://github.com/pyload/pyload/security/advisories/GHSA-mp82-fmj6-f22v - Exploit, Mitigation, Vendor Advisory |
21 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/pyload/pyload/security/advisories/GHSA-mp82-fmj6-f22v - |
21 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-21 18:16
Updated : 2026-04-27 19:43
NVD link : CVE-2026-40594
Mitre link : CVE-2026-40594
CVE.ORG link : CVE-2026-40594
JSON object : View
Products Affected
pyload-ng_project
- pyload-ng
CWE
CWE-346
Origin Validation Error
