Duty Analyst: Salva Rocha

CVE-2026-35464

Published: 2026-04-07 15:17:45 | Last modified: 2026-04-23 15:13:57

HIGH CVSS 7.5
No EPSS data

Description

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set and passes the existing path restriction because the Flask session directory is outside both PKGDIR and userdir. A user with SETTINGS and ADD permissions can redirect downloads to the Flask filesystem session store, plant a malicious pickle payload as a predictable session file, and trigger arbitrary code execution when any HTTP request arrives with the corresponding session cookie. This vulnerability is fixed with commit c4cf995a2803bdbe388addfc2b0f323277efc0e1.

CVSS details

Severity
high
Score
7.5
Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

This CVE is not currently listed in the EPSS dataset.

Show JSON
{
    "cve": {
        "id": "CVE-2026-35464",
        "cveTags": [],
        "metrics": {
            "cvssMetricV31": [
                {
                    "type": "Secondary",
                    "source": "security-advisories@github.com",
                    "cvssData": {
                        "scope": "UNCHANGED",
                        "version": "3.1",
                        "baseScore": 7.5,
                        "attackVector": "NETWORK",
                        "baseSeverity": "HIGH",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "integrityImpact": "HIGH",
                        "userInteraction": "NONE",
                        "attackComplexity": "HIGH",
                        "availabilityImpact": "HIGH",
                        "privilegesRequired": "LOW",
                        "confidentialityImpact": "HIGH"
                    },
                    "impactScore": 5.9,
                    "exploitabilityScore": 1.6
                }
            ]
        },
        "published": "2026-04-07T15:17:44.523",
        "references": [
            {
                "url": "https://github.com/pyload/pyload/commit/c4cf995a2803bdbe388addfc2b0f323277efc0e1",
                "tags": [
                    "Patch"
                ],
                "source": "security-advisories@github.com"
            },
            {
                "url": "https://github.com/pyload/pyload/security/advisories/GHSA-4744-96p5-mp2j",
                "tags": [
                    "Exploit",
                    "Vendor Advisory",
                    "Mitigation"
                ],
                "source": "security-advisories@github.com"
            },
            {
                "url": "https://github.com/pyload/pyload/security/advisories/GHSA-r7mc-x6x7-cqxx",
                "tags": [
                    "Exploit",
                    "Vendor Advisory"
                ],
                "source": "security-advisories@github.com"
            },
            {
                "url": "https://www.cve.org/CVERecord?id=CVE-2026-33509",
                "tags": [
                    "Third Party Advisory"
                ],
                "source": "security-advisories@github.com"
            },
            {
                "url": "https://github.com/pyload/pyload/security/advisories/GHSA-4744-96p5-mp2j",
                "tags": [
                    "Exploit",
                    "Vendor Advisory",
                    "Mitigation"
                ],
                "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
            }
        ],
        "vulnStatus": "Analyzed",
        "weaknesses": [
            {
                "type": "Secondary",
                "source": "security-advisories@github.com",
                "description": [
                    {
                        "lang": "en",
                        "value": "CWE-502"
                    },
                    {
                        "lang": "en",
                        "value": "CWE-863"
                    }
                ]
            }
        ],
        "descriptions": [
            {
                "lang": "en",
                "value": "pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set and passes the existing path restriction because the Flask session directory is outside both PKGDIR and userdir. A user with SETTINGS and ADD permissions can redirect downloads to the Flask filesystem session store, plant a malicious pickle payload as a predictable session file, and trigger arbitrary code execution when any HTTP request arrives with the corresponding session cookie. This vulnerability is fixed with commit c4cf995a2803bdbe388addfc2b0f323277efc0e1."
            }
        ],
        "lastModified": "2026-04-23T15:13:57.010",
        "configurations": [
            {
                "nodes": [
                    {
                        "negate": false,
                        "cpeMatch": [
                            {
                                "criteria": "cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "970C5BF4-1BD4-470D-A352-57CADD3CA326",
                                "versionEndExcluding": "2026-04-02"
                            }
                        ],
                        "operator": "OR"
                    }
                ]
            }
        ],
        "sourceIdentifier": "security-advisories@github.com"
    }
}