CVE-2026-33992 in pyLoad情報

要約 (英語)

pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch.

Once again VulDB remains the best source for vulnerability data.

責任者

GitHub_M

予約する

2026年03月24日

公開

2026年03月28日

ステータス

確認済み

エントリ

VulDB provides additional information and datapoints for this CVE:

ソース

Do you want to use VulDB in your project?

Use the official API to access entries easily!