๐Ÿ” CVE Alert

CVE-2026-33992

UNKNOWN 0.0

pyLoad: Server-Side Request Forgery via Download Link Submission Enables Cloud Metadata Exfiltration

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
24th

pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch.

CWE CWE-918
Vendor pyload
Product pyload
Published Mar 27, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for pyload pyload

Be the first to know when new unknown vulnerabilities affecting pyload pyload are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

pyload / pyload
< 0.5.0b3.dev97

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x github.com: https://github.com/pyload/pyload/commit/b76b6d4ee5e32d2118d26afdee1d0a9e57d4bfe8