| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w48f-wwwf-f5fr | pyLoad: Improper Neutralization of Special Elements used in an OS Command |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload
Pyload pyload |
|
| Vendors & Products |
Pyload
Pyload pyload |
Wed, 08 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is only applied to core config options, not to plugin config options. The AntiVirus plugin stores an executable path (avfile) in its config, which is passed directly to subprocess.Popen(). A non-admin user with SETTINGS permission can change this path to achieve remote code execution. | |
| Title | pyLoad has Improper Neutralization of Special Elements used in an OS Command | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T14:46:07.056Z
Reserved: 2026-04-02T19:25:52.193Z
Link: CVE-2026-35463
Updated: 2026-04-08T14:46:01.708Z
Status : Awaiting Analysis
Published: 2026-04-07T15:17:44.363
Modified: 2026-04-08T21:27:15.610
Link: CVE-2026-35463
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:48:46Z
Github GHSA