CVSS 9.5CVE-2026-33314CVE-2026-33509CVE-2026-33992

Multiple Vulnerabilities in pyload-ng Expose Systems to RCE and SSRF

Critical vulnerabilities in pyload-ng allow RCE, SSRF, and metadata exfiltration. Update to version 0.5.0b3.dev97 to mitigate these risks.

Published on

Multiple critical vulnerabilities have been discovered in pyload-ng, potentially leading to Remote Code Execution (RCE), Server-Side Request Forgery (SSRF), and sensitive data exposure. These vulnerabilities affect versions up to 0.5.0b3.dev96, and users are urged to update to version 0.5.0b3.dev97 immediately to mitigate these risks.

These vulnerabilities range from high to critical, potentially allowing attackers to compromise systems.

What is Pyload Ng?

Pyload Ng is a free and open-source download manager written in Python. It's designed to automate the process of downloading files from various sources, including file hosting websites and streaming services. To learn more, search all pyload-ng CVEs.

CVE-2026-33314: pyload-ng Host Header Spoofing Vulnerability

CVSS6.5
Affected versionsThis vulnerability affects pyload-ng versions up to and including 0.5.0b3.dev96.

Medium severity, potentially exploitable with low effort.

EPSS score suggests a low probability of exploitation.

A host header spoofing vulnerability exists in pyload-ng's `@local_check` decorator, allowing unauthenticated attackers to bypass local-only restrictions. By spoofing the `Host` header, attackers can access Click'N'Load API endpoints and queue arbitrary downloads.

How to fix CVE-2026-33314 in pyload-ng

Patch within 24h
  1. 1.Upgrade pyload-ng to version 0.5.0b3.dev97 or later.
Upgrade pyload-ng
pip install --upgrade pyload-ng

Workaround: Disable the Click'N'Load plugin if possible.

NextGuard automatically flags CVE-2026-33314 if pyload-ng appears in any of your monitored projects — no manual lookup required.

CVE-2026-33509: pyload-ng Remote Code Execution via Reconnect Script Configuration

CVSS7.5
Affected versionsThis vulnerability affects pyload-ng versions up to and including 0.5.0b3.dev96. Users with the SETTINGS permission are particularly at risk.

High severity, potentially leading to system compromise.

EPSS score suggests a low probability of exploitation.

The `set_config_value()` API endpoint in pyload-ng allows users with `SETTINGS` permission to modify the `reconnect.script` configuration option without restriction. This enables them to set an arbitrary executable file path, leading to Remote Code Execution (RCE).

How to fix CVE-2026-33509 in pyload-ng

Patch within 24h
  1. 1.Upgrade pyload-ng to version 0.5.0b3.dev97 or later.
Upgrade pyload-ng
pip install --upgrade pyload-ng

Workaround: Restrict SETTINGS permissions to trusted users only. Avoid enabling the reconnect feature.

NextGuard automatically flags CVE-2026-33509 if pyload-ng appears in any of your monitored projects — no manual lookup required.

CVE-2026-33992: pyload-ng Server-Side Request Forgery (SSRF) Vulnerability

CVSS9.5
Affected versionsThis vulnerability affects pyload-ng versions up to and including 0.5.0b3.dev96. Cloud deployments are particularly vulnerable.

Critical severity, potentially leading to complete system compromise.

EPSS score suggests a low probability of exploitation.

PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata.

How to fix CVE-2026-33992 in pyload-ng

Patch immediately
  1. 1.Upgrade pyload-ng to version 0.5.0b3.dev97 or later.
Upgrade pyload-ng
pip install --upgrade pyload-ng

Workaround: Monitor network traffic for unusual outbound requests. Restrict network access from the pyload-ng instance.

NextGuard automatically flags CVE-2026-33992 if pyload-ng appears in any of your monitored projects — no manual lookup required.

Stay ahead of Python vulnerabilities

Proactively detect and remediate vulnerabilities in your Python dependencies. Monitor your python dependencies with real-time alerts and comprehensive reporting.

Compare Plans

Frequently asked questions

These vulnerabilities highlight the importance of keeping your dependencies up to date. Regularly see all python vulnerabilities and apply security patches promptly to protect your systems from potential attacks.

Related topics

Remote Code ExecutionServer-Side Request ForgeryPython SecurityDependency Management