CVE-2026-35586Incorrect Authorization in Pyload

Severity
6.8MEDIUMNVD
EPSS
0.0%
top 94.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 7
Latest updateApr 8

Description

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the ADMIN_ONLY_CORE_OPTIONS authorization set in set_config_value() uses incorrect option names ssl_cert and ssl_key, while the actual configuration option names are ssl_certfile and ssl_keyfile. This name mismatch causes the admin-only check to always evaluate to False, allowing any user with SETTINGS permission to overwrite the SSL certificate and key file paths. Additionally, the ssl_certchain option

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 1.6 | Impact: 5.2

Affected Packages2 packages

CVEListV5pyload/pyload< 0.5.0b3.dev97
PyPIpyload-ng_project/pyload-ng< 0.5.0b3.dev97

🔴Vulnerability Details

3
OSV
pyload-ng: Authorization Bypass for SSL Certificate/Key Configuration Due to Option Name Mismatch in pyload-ng2026-04-08
GHSA
pyload-ng: Authorization Bypass for SSL Certificate/Key Configuration Due to Option Name Mismatch in pyload-ng2026-04-08
CVEList
Authorization Bypass for SSL Certificate/Key Configuration Due to Option Name Mismatch in pyload-ng2026-04-07

🕵️Threat Intelligence

1
Wiz
CVE-2026-35586 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-35586 — Incorrect Authorization in Pyload | cvebase