Impact
Non‑admin SETTINGS users can modify any configuration via the set_config_value API in pyLoad. The vulnerable setting, reconnect.script, is passed directly to subprocess.run without validation, allowing an attacker to run arbitrary executables. This missing access control flaw enables remote code execution, a high‑severity weakness classified as CWE‑269.
Affected Systems
The vulnerability affects pyLoad (pyload‑ng project) versions from 0.4.0 up to, but not including, 0.5.0b3.dev97. No other vendors are listed. The patch was released in 0.5.0b3.dev97.
Risk and Exploitability
CVSS 7.5 indicates high severity; EPSS is <1%, so exploitation probability is low but still significant. The vulnerability is not in CISA’s KEV catalog. A user possessing the SETTINGS role—typically a regular user—can trigger the flaw via authenticated API calls. By specifying any executable path in reconnect.script, the attacker can run code on the system, compromising confidentiality, integrity, and availability. The likely attack vector is authenticated local or remote access depending on how pyLoad is deployed.
OpenCVE Enrichment
Github GHSA