Description
pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, a Host Header Spoofing vulnerability in the @local_check decorator allows unauthenticated external attackers to bypass local-only restrictions. This grants access to the Click'N'Load API endpoints, enabling attackers to remotely queue arbitrary downloads, leading to Server-Side Request Forgery (SSRF) and Denial of Service (DoS). This issue has been patched in version 0.5.0b3.dev97.
Published: 2026-03-24
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

The pyload-ng download manager includes a Host Header Spoofing weakness in the @local_check decorator. An unauthenticated external attacker can supply a forged Host header to bypass the intended local‑only restriction, exposing the Click'N'Load API endpoints. Through these endpoints the attacker can trigger arbitrary download requests to remote resources, which results in Server‑Side Request Forgery (SSRF) and can lead to Denial of Service conditions on the host. This vulnerability is rooted in Weak Authentication (CWE‑287) and Improper Origin Validation (CWE‑346).

Affected Systems

pyload-ng, the open‑source download manager, is affected for all releases older than 0.5.0b3.dev97. Vulnerable installations run the Python implementation of the tool and have not applied the official patch that addresses the host‑header validation flaw.

Risk and Exploitability

The CVSS v3.1 score of 6.5 indicates a medium severity risk. With an EPSS probability of less than 1%, the likelihood of widespread exploitation is low, and the issue is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending HTTP requests with a spoofed Host header from an external network, targeting the /clicknload API endpoints. No user authentication or elevated privileges are required, and the impact includes the ability to force the service to download arbitrary data and potentially disrupt service availability.

Generated by OpenCVE AI on March 26, 2026 at 16:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade pyload-ng to version 0.5.0b3.dev97 or later.
  • If an upgrade is not immediately possible, block external access to the Click'N'Load API endpoints using firewall rules or IP whitelisting.
  • Monitor API logs for abnormal download requests or excessive activity that may indicate exploitation.

Generated by OpenCVE AI on March 26, 2026 at 16:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q485-cg9q-xq2r Improper Authentication and Origin Validation Error in pyload-ng
History

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Pyload-ng Project
Pyload-ng Project pyload-ng
CPEs cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*
Vendors & Products Pyload-ng Project
Pyload-ng Project pyload-ng

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Pyload
Pyload pyload
Vendors & Products Pyload
Pyload pyload

Tue, 24 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, a Host Header Spoofing vulnerability in the @local_check decorator allows unauthenticated external attackers to bypass local-only restrictions. This grants access to the Click'N'Load API endpoints, enabling attackers to remotely queue arbitrary downloads, leading to Server-Side Request Forgery (SSRF) and Denial of Service (DoS). This issue has been patched in version 0.5.0b3.dev97.
Title pyload-ng: Improper Authentication and Origin Validation Error
Weaknesses CWE-287
CWE-346
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Pyload Pyload
Pyload-ng Project Pyload-ng
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T19:52:13.088Z

Reserved: 2026-03-18T21:23:36.676Z

Link: CVE-2026-33314

cve-icon Vulnrichment

Updated: 2026-03-26T19:51:22.975Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T20:16:27.690

Modified: 2026-03-26T12:01:09.083

Link: CVE-2026-33314

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:20:43Z

Weaknesses