pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.
References
| Link | Resource |
|---|---|
| https://github.com/pyload/pyload/security/advisories/GHSA-6px9-j4qr-xfjw | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-07 16:15
Updated : 2026-03-11 22:09
NVD link : CVE-2026-29778
Mitre link : CVE-2026-29778
CVE.ORG link : CVE-2026-29778
JSON object : View
Products Affected
pyload-ng_project
- pyload-ng
CWE
CWE-23
Relative Path Traversal
