Impact
PyLoad's download engine, before version 0.5.0b3.dev97, accepts any user-supplied URL without validation, creating a Server‑Side Request Forgery (CWE‑918). An authenticated attacker can submit a malicious link that forces the server to fetch the target, enabling access to internal network services and extraction of cloud provider metadata, including droplet identifiers, network configuration, region, authentication keys, and SSH keys exposed in user‑data on DigitalOcean droplets.
Affected Systems
Every pyLoad instance running a version earlier than 0.5.0b3.dev97 is affected. The flaw applies to any user who can submit download links through the web interface or API when authenticated.
Risk and Exploitability
The CVSS score of 9.3 indicates a critical risk. Exploitation requires only an authenticated account on the pyLoad service, making it readily feasible for legitimate or compromised users. No EPSS data is available, and the vulnerability is not listed in the KEV catalog, but the potential to expose sensitive infrastructure data makes the threat significant.
OpenCVE Enrichment
Github GHSA