Remote Code Execution Risk in pyLoad Download Manager by pyLoad
CVE-2026-33509
What is CVE-2026-33509?
The pyLoad download manager is susceptible to a security flaw that permits users with limited SETTINGS permissions to modify crucial configuration options without proper validation. Specifically, the set_config_value() API endpoint is exploitable, enabling non-admin users to alter the reconnect.script configuration. This setting can be directed to any executable on the file system, leading to potential remote code execution. A mere hardcoded validation for the general.storage_folder is in place, while other critical settings remain exposed and writable. This vulnerability has been addressed in pyLoad version 0.5.0b3.dev97, ensuring enhanced security measures.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
pyload >= 0.4.0, < 0.5.0b3.dev97
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
