Plattform
python
Komponente
pyload
Behoben in
0.5.1
CVE-2026-35187 describes a Server-Side Request Forgery (SSRF) vulnerability discovered in pyLoad, a free and open-source download manager written in Python. This flaw allows an authenticated user with ADD permission to make arbitrary HTTP/HTTPS requests, potentially exposing internal network resources and sensitive data. The vulnerability impacts versions 0.5.0b3.dev0 through 0.5.0b3.dev96, and a fix is available in version 0.5.0b3.dev96.
The SSRF vulnerability in pyLoad allows an attacker to initiate requests from the server as if they originated from the pyLoad application itself. This can be exploited to access internal network resources that are not directly accessible from the outside world. Specifically, an attacker could read local files via the file:// protocol, interact with internal services using gopher:// and dict:// protocols, and enumerate file existence. Furthermore, the attacker can access cloud metadata endpoints, potentially exposing sensitive cloud credentials. The ability to make arbitrary HTTP/HTTPS requests significantly expands the attack surface, enabling reconnaissance and potential exploitation of other internal systems.
This vulnerability was publicly disclosed on 2026-04-06. There is currently no indication of active exploitation in the wild, and no public proof-of-concept (PoC) code has been released. The vulnerability is not currently listed on the CISA KEV catalog. Given the SSRF nature and the ease of exploitation, it is recommended to prioritize patching to prevent potential future attacks.
Organizations using pyLoad for download management, particularly those with internal networks accessible from the internet, are at risk. Shared hosting environments where multiple users have access to the pyLoad API are especially vulnerable, as a compromised user account could be used to exploit the SSRF vulnerability and access resources belonging to other users.
• python / server:
import requests
import re
def check_pyload_ssrf(url):
try:
response = requests.get(url, timeout=5)
if response.status_code == 200:
if re.search(r'file://', url) or re.search(r'gopher://', url) or re.search(r'dict://', url):
print(f"Potential SSRF vulnerability detected: {url}")
else:
print(f"URL accessed: {url}")
except requests.exceptions.RequestException as e:
print(f"Error accessing {url}: {e}")
# Example usage (replace with actual API endpoint)
api_endpoint = "http://your-pyload-server/api/add"
# Test with potentially malicious URLs
check_pyload_ssrf("file:///etc/passwd")
check_pyload_ssrf("gopher://127.0.0.1/some_internal_service")disclosure
Exploit-Status
EPSS
0.03% (9% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-35187 is to upgrade pyLoad to version 0.5.0b3.dev96 or later, which includes the necessary URL validation and protocol restriction fixes. If upgrading immediately is not feasible, consider implementing temporary workarounds such as restricting network access for the pyLoad application using a firewall or proxy. Additionally, carefully review and restrict the permissions granted to authenticated users, ensuring they only have the necessary privileges. Monitor network traffic for unusual outbound requests originating from the pyLoad server. After upgrading, confirm the fix by attempting to access an internal resource via the parse_urls API and verifying that the request is blocked.
Aktualisieren Sie auf Version 0.5.0b3.dev96 oder höher, um die SSRF-Vulnerabilität zu entschärfen. Diese Version implementiert die URL-Validierung und Protokollbeschränkungen, um unautorisierten Zugriff auf interne Ressourcen zu verhindern.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-35187 is a Server-Side Request Forgery vulnerability in pyLoad versions 0.5.0b3.dev0 through 0.5.0b3.dev96, allowing authenticated users to make arbitrary requests.
You are affected if you are using pyLoad versions 0.5.0b3.dev0 through 0.5.0b3.dev96 and have not upgraded to 0.5.0b3.dev96 or later.
Upgrade pyLoad to version 0.5.0b3.dev96 or later. Consider temporary workarounds like restricting API access and implementing WAF rules if immediate upgrade is not possible.
There is currently no indication of active exploitation campaigns targeting this vulnerability, but the HIGH severity score warrants immediate attention.
Refer to the pyLoad project's official website or GitHub repository for the latest security advisories and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.