Remote Code Execution Risk in pyLoad Download Manager by pyLoad
CVE-2026-33509

7.5HIGH

Key Information:

Vendor

Pyload

Status
Vendor
CVE Published:
24 March 2026

What is CVE-2026-33509?

The pyLoad download manager is susceptible to a security flaw that permits users with limited SETTINGS permissions to modify crucial configuration options without proper validation. Specifically, the set_config_value() API endpoint is exploitable, enabling non-admin users to alter the reconnect.script configuration. This setting can be directed to any executable on the file system, leading to potential remote code execution. A mere hardcoded validation for the general.storage_folder is in place, while other critical settings remain exposed and writable. This vulnerability has been addressed in pyLoad version 0.5.0b3.dev97, ensuring enhanced security measures.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

pyload >= 0.4.0, < 0.5.0b3.dev97

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.