CVE-2026-35459Server-Side Request Forgery in Pyload

Severity
9.3CRITICALNVD
EPSS
0.0%
top 90.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 6

Description

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, pyLoad has a server-side request forgery (SSRF) vulnerability. The fix for CVE-2026-33992 added IP validation to BaseDownloader.download() that checks the hostname of the initial download URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, causing it to automatically follow HTTP redirects. Redirect targets are never validated against the SSRF filter. An authenticated user wit

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Affected Packages2 packages

CVEListV5pyload/pyload0.5.0b3.dev96
PyPIpyload-ng_project/pyload-ng0.5.0b3.dev96

🔴Vulnerability Details

3
CVEList
pyLoad has SSRF fix bypass via HTTP redirect2026-04-06
OSV
pyLoad: SSRF filter bypass via HTTP redirect in BaseDownloader (Incomplete fix for CVE-2026-33992)2026-04-04
GHSA
pyLoad: SSRF filter bypass via HTTP redirect in BaseDownloader (Incomplete fix for CVE-2026-33992)2026-04-04

🕵️Threat Intelligence

1
Wiz
CVE-2026-35459 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-35459 — Server-Side Request Forgery in Pyload | cvebase