CVE-2025-61773

8.1 HIGH

📋 TL;DR

This vulnerability in pyLoad allows attackers to inject malicious content into the web interface due to insufficient input validation in the Captcha script and Click'N'Load endpoints. It affects all pyLoad instances with web interface enabled, potentially leading to client-side code execution (XSS) when users interact with the compromised interface. The flaw enables manipulation of request handling and unintended behaviors through crafted HTTP requests.

💻 Affected Systems

Products:
  • pyLoad
Versions: All versions prior to 0.5.0b3.dev91
Operating Systems: All platforms running pyLoad
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with web interface enabled. Command-line only usage is not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full client-side compromise through persistent XSS leading to session hijacking, credential theft, or malware distribution to users accessing the pyLoad web interface.

🟠

Likely Case

Reflected XSS attacks where attackers trick users into clicking malicious links, potentially stealing session cookies or performing actions on behalf of authenticated users.

🟢

If Mitigated

Limited impact with proper network segmentation and user awareness, though injection vectors remain accessible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities are commonly weaponized. The advisory provides technical details but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.5.0b3.dev91

Vendor Advisory: https://github.com/pyload/pyload/security/advisories/GHSA-cjjf-27cc-pvmv

Restart Required: Yes

Instructions:

1. Stop pyLoad service. 2. Update to version 0.5.0b3.dev91 or later via pip: 'pip install --upgrade pyload-ng'. 3. Restart pyLoad service. 4. Verify the fix by checking version.

🔧 Temporary Workarounds

Disable Web Interface

all

Temporarily disable the vulnerable web interface components

Edit pyLoad config to disable web interface or set 'webui.enabled = false'

Network Restriction

linux

Restrict access to pyLoad web interface using firewall rules

iptables -A INPUT -p tcp --dport 8000 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 8000 -j DROP

🧯 If You Can't Patch

  • Implement strict WAF rules to block XSS payloads in HTTP requests to pyLoad endpoints
  • Isolate pyLoad instance in separate network segment with no internet access

🔍 How to Verify

Check if Vulnerable:

Check pyLoad version: if version < 0.5.0b3.dev91 and web interface enabled, system is vulnerable

Check Version:

pyload --version or check pyLoad web interface about page

Verify Fix Applied:

Confirm version is 0.5.0b3.dev91 or later and test web interface functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to /flash/captcha or /cnl endpoints with script tags or encoded payloads
  • Multiple failed validation attempts on input fields

Network Indicators:

  • HTTP requests containing JavaScript payloads to pyLoad web ports
  • Unusual traffic patterns to Captcha or CNL endpoints

SIEM Query:

source="pyload.log" AND (uri_path="/flash/captcha" OR uri_path="/cnl") AND (content CONTAINS "<script>" OR content CONTAINS "javascript:")

🔗 References

📤 Share & Export