CVE-2026-29778

7.1 HIGH

📋 TL;DR

This vulnerability in pyLoad allows attackers to bypass directory traversal protections in the edit_package() function using recursive path sequences like '....//' or '..././'. This enables unauthorized file system access, potentially leading to file reading, modification, or deletion. Users running pyLoad versions 0.5.0b3.dev13 through 0.5.0b3.dev96 are affected.

💻 Affected Systems

Products:
  • pyLoad
Versions: 0.5.0b3.dev13 to 0.5.0b3.dev96
Operating Systems: All platforms running pyLoad
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file write leading to remote code execution, sensitive data exposure, or service disruption.

🟠

Likely Case

Unauthorized file access allowing reading of configuration files, credentials, or sensitive user data stored on the server.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation, potentially only allowing access to non-critical files.

🌐 Internet-Facing: HIGH - pyLoad is often exposed to the internet for remote download management, making it accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to escalate privileges or access sensitive files on the host system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the edit_package function, but the bypass technique is simple and well-documented in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.5.0b3.dev97

Vendor Advisory: https://github.com/pyload/pyload/security/advisories/GHSA-6px9-j4qr-xfjw

Restart Required: Yes

Instructions:

1. Stop pyLoad service. 2. Update to version 0.5.0b3.dev97 or later using pip: 'pip install --upgrade pyload-ng'. 3. Restart pyLoad service.

🔧 Temporary Workarounds

Disable edit_package functionality

all

Temporarily disable or restrict access to the vulnerable edit_package() function

Modify pyLoad configuration to remove or restrict package editing permissions

Implement additional path validation

all

Add custom path sanitization that properly handles recursive traversal sequences

Implement path normalization using os.path.normpath() before processing

🧯 If You Can't Patch

  • Restrict pyLoad service account permissions to minimal required directories
  • Implement network segmentation to isolate pyLoad from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check pyLoad version: if between 0.5.0b3.dev13 and 0.5.0b3.dev96 inclusive, system is vulnerable.

Check Version:

pyload --version or check pyLoad web interface version information

Verify Fix Applied:

Confirm version is 0.5.0b3.dev97 or later and test that path traversal sequences like '....//' are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in pyLoad logs
  • Multiple failed path traversal attempts
  • Access to files outside expected download directories

Network Indicators:

  • HTTP requests with unusual path sequences in pack_folder parameter
  • Multiple edit_package requests with varying path patterns

SIEM Query:

source="pyload.log" AND ("edit_package" OR "pack_folder") AND (".." OR "../" OR "./")

🔗 References

📤 Share & Export