pyload is an open-source Download Manager written in pure Python. An authenticated user can change the download folder and upload a crafted template to the specified folder lead to remote code execution. There is no fix available at the time of publication.
References
Link | Resource |
---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f | Exploit Vendor Advisory |
https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f | Exploit Vendor Advisory |
Configurations
History
04 Sep 2025, 14:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:* | |
First Time |
Pyload
Pyload pyload |
21 Nov 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f - |
26 Apr 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-26 18:15
Updated : 2025-09-04 14:23
NVD link : CVE-2024-32880
Mitre link : CVE-2024-32880
CVE.ORG link : CVE-2024-32880
JSON object : View
Products Affected
pyload
- pyload
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type