CVE-2025-54802Path Traversal in Project Pyload-ng

CWE-22Path Traversal4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
1.2%
top 21.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 5

Description

pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing unauthenticated attackers to write arbitrary files outside the designated storage directory. This can be abused to ove

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

PyPIpyload-ng_project/pyload-ng< 0.5.0b3.dev90
CVEListV5pyload/pyload>= 0.5.0b3.dev89, < 0.5.0b3.dev90
NVDpyload-ng_project/pyload-ng0.5.0b3.dev89

Patches

🔴Vulnerability Details

3
CVEList
pyLoad CNL Blueprint is vulnerable to Path Traversal through `dlc_path` leading to Remote Code Execution (RCE)2025-08-05
OSV
pyLoad CNL Blueprint allows Path Traversal through `dlc_path` which leads to Remote Code Execution (RCE)2025-08-04
GHSA
pyLoad CNL Blueprint allows Path Traversal through `dlc_path` which leads to Remote Code Execution (RCE)2025-08-04
CVE-2025-54802 — Path Traversal in Project Pyload-ng | cvebase