CVE-2026-29778
pyLoad: Arbitrary File Write via Path Traversal in edit_package()
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th
pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.
| CWE | CWE-23 |
| Vendor | pyload |
| Product | pyload |
| Published | Mar 7, 2026 |
| Last Updated | Mar 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for pyload pyload
Be the first to know when new high vulnerabilities affecting pyload pyload are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low
Affected Versions
pyload / pyload
>= 0.5.0b3.dev13, < 0.5.0b3.dev97