pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploitation requires no user interaction or authentication and can result in session hijacking, credential theft, and full system remote code execution. Commit 909e5c97885237530d1264cfceb5555870eb9546, the patch for the issue, is included in version 0.5.0b3.dev89.
References
Configurations
No configuration.
History
15 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53 - |
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Jul 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-15 00:15
Updated : 2025-07-15 20:15
NVD link : CVE-2025-53890
Mitre link : CVE-2025-53890
CVE.ORG link : CVE-2025-53890
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')