Impact
The vulnerability stems from the edit_package() function in pyLoad, which inadequately sanitizes the pack_folder parameter, relying on a single-pass replacement of "../". Crafted recursive traversal sequences bypass this check, allowing the attacker to write to any path relative to the pyLoad installation. This path traversal flaw is classified as CWE-23 and can lead to arbitrary file overwrites, potentially replacing critical configuration files or injecting malicious scripts.
Affected Systems
pyLoad, versions 0.5.0b3.dev13 through 0.5.0b3.dev96 inclusive. The issue is fixed in 0.5.0b3.dev97 and later revisions; earlier or lower-numbered releases are unaffected.
Risk and Exploitability
The CVSS score of 7.1 indicates moderate severity, while the EPSS score of <1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attacker would need local execution or control over pyLoad to trigger edit_package() with a crafted pack_folder value. The likely attack vector is a local user or a compromised local process. In environments where untrusted input can be supplied to pyLoad, or where multiple users share the same installation, the risk escalates, as unauthorized file writes could compromise user data or the pyLoad configuration.
OpenCVE Enrichment
Github GHSA