CVE-2026-32808

pyLoad is a free and open-source download manager written in Python. Versions before 0.5.0b3.dev97 are vulnerable to path traversal during password verification of certain encrypted 7z archives (encrypted files with non-encrypted headers), causing arbitrary file deletion outside of the extraction directory. During password verification, pyLoad derives an archive entry name from 7z listing output and treats it as a filesystem path without constraining it to the extraction directory. This issue has been fixed in version 0.5.0b3.dev97.
References
Link Resource
https://github.com/pyload/pyload/security/advisories/GHSA-7g4m-8hx2-4qh3 Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*

History

No history.

Information

Published : 2026-03-20 02:16

Updated : 2026-03-26 18:36


NVD link : CVE-2026-32808

Mitre link : CVE-2026-32808

CVE.ORG link : CVE-2026-32808


JSON object : View

Products Affected

pyload

  • pyload

pyload-ng_project

  • pyload-ng
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')