๐Ÿ” CVE Alert

CVE-2026-40594

MEDIUM 4.8

pyLoad: Session Cookie Security Downgrade via Untrusted X-Forwarded-Proto Header Spoofing (Global State Race Condition)

CVSS Score
4.8
EPSS Score
0.0%
EPSS Percentile
0th

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev98, the set_session_cookie_secure before_request handler in src/pyload/webui/app/__init__.py reads the X-Forwarded-Proto header from any HTTP request without validating that the request originates from a trusted proxy, then mutates the global Flask configuration SESSION_COOKIE_SECURE on every request. Because pyLoad uses the multi-threaded Cheroot WSGI server (request_queue_size=512), this creates a race condition where an attacker's request can influence the Secure flag on other users' session cookies โ€” either downgrading cookie security behind a TLS proxy or causing a session denial-of-service on plain HTTP deployments. This vulnerability is fixed in 0.5.0b3.dev98.

CWE CWE-346
Vendor pyload
Product pyload
Published Apr 21, 2026
Last Updated Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for pyload pyload

Be the first to know when new medium vulnerabilities affecting pyload pyload are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
Low

Affected Versions

pyload / pyload
< 0.5.0b3.dev98

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pyload/pyload/security/advisories/GHSA-mp82-fmj6-f22v