Server-Side Request Forgery in pyLoad Download Manager
CVE-2026-35459

9.3CRITICAL

Key Information:

Vendor

Pyload

Status
Vendor
CVE Published:
6 April 2026

What is CVE-2026-35459?

pyLoad, an open-source download manager developed in Python, contains a vulnerability that allows an authenticated user with ADD permissions to exploit a server-side request forgery (SSRF). This flaw arises from the failure to validate redirect targets against an SSRF filter due to the configuration of pycurl. Despite the addition of IP validation in a previous fix, the setting of FOLLOWLOCATION=1 and MAXREDIRS=10 allows links leading to internal addresses to be followed unverified. This can potentially lead to unauthorized access to internal resources.

Affected Version(s)

pyload <= 0.5.0b3.dev96

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.