CVE-2026-29778Relative Path Traversal in Project Pyload-ng

Severity
6.5MEDIUMNVD
CNA7.1
EPSS
0.0%
top 95.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 7

Description

pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDpyload-ng_project/pyload-ng0.5.0b3.dev130.5.0b3.dev97
PyPIpyload-ng_project/pyload-ng0.5.0b3.dev130.5.0b3.dev96
CVEListV5pyload/pyload>= 0.5.0b3.dev13, < 0.5.0b3.dev97

🔴Vulnerability Details

3
CVEList
pyLoad: Arbitrary File Write via Path Traversal in edit_package()2026-03-07
GHSA
pyLoad has an Arbitrary File Write via Path Traversal in edit_package()2026-03-05
OSV
pyLoad has an Arbitrary File Write via Path Traversal in edit_package()2026-03-05

🕵️Threat Intelligence

1
Wiz
CVE-2026-29778 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-29778 — Relative Path Traversal | cvebase