CVE-2026-33509
Severity CVSS v4.0:
Pending analysis
Type:
CWE-269
Improper Privilege Management
Publication date:
24/03/2026
Last modified:
26/03/2026
Description
pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option without restriction. The reconnect.script config option controls a file path that is passed directly to subprocess.run() in the thread manager's reconnect logic. A SETTINGS user can set this to any executable file on the system, achieving Remote Code Execution. The only validation in set_config_value() is a hardcoded check for general.storage_folder — all other security-critical settings including reconnect.script are writable without any allowlist or path restriction. This issue has been patched in version 0.5.0b3.dev97.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:* | 0.4 (including) | 0.4.20 (including) |
| cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:* | 0.5.0a5.dev528 (including) | 0.5.0b3.dev97 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



