CVE-2026-33511 PUBLISHED

pyload-ng: Authentication Bypass via Host Header Injection in ClickNLoad

Assigner: GitHub_M
Reserved: 20.03.2026 Published: 24.03.2026 Updated: 25.03.2026

pyLoad is a free and open-source download manager written in Python. From version 0.4.20 to before version 0.5.0b3.dev97, the local_check decorator in pyLoad's ClickNLoad feature can be bypassed by any remote attacker through HTTP Host header spoofing. This allows unauthenticated remote users to access localhost-restricted endpoints, enabling them to inject arbitrary downloads, write files to the storage directory, and execute JavaScript code. This issue has been patched in version 0.5.0b3.dev97.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:L/SA:N
CVSS Score: 8.8

Product Status

Vendor pyload
Product pyload
Versions
  • Version >= 0.4.20, < 0.5.0b3.dev97 is affected

References

Problem Types

  • CWE-639: Authorization Bypass Through User-Controlled Key CWE