Python RCE (CVE-2026-29778)
CVE-2026-29778
pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder p...
Overview
A high-severity security vulnerability, tracked as CVE-2026-29778, has been identified in the open-source pyLoad download manager. This flaw allows attackers to bypass directory protections, potentially leading to unauthorized file access or manipulation on the server hosting the pyLoad application.
Vulnerability Details
The vulnerability exists in the edit_package() function within pyLoad versions 0.5.0b3.dev13 through 0.5.0b3.dev96. The flaw is a path traversal weakness caused by insufficient input sanitization. Specifically, the application attempts to prevent directory traversal by performing a single-pass replacement of the sequence ../ in the pack_folder parameter. However, this protection is inadequate. An attacker can craft recursive traversal sequences (such as ....//) that, after the simple replacement, reconstruct into the forbidden ../ sequence, successfully bypassing the check. This allows access to files and directories outside the intended restricted folder.
Impact
If successfully exploited, this vulnerability could enable an authenticated attacker to read, overwrite, or delete sensitive files on the underlying operating system. The impact severity depends on the permissions of the pyLoad process. In many deployments, this could lead to a full compromise of the host server, data theft, or service disruption. For administrators, understanding such flaws is crucial, as they are a common vector in larger attack chains that can lead to significant data breaches. You can review recent incidents at breach reports.
Affected Versions
- pyLoad versions 0.5.0b3.dev13 through 0.5.0b3.dev96 are confirmed vulnerable.
Remediation and Mitigation
The primary and most critical action is to update the pyLoad software immediately.
- Patch Immediately: Upgrade pyLoad to version 0.5.0b3.dev97 or any later release. This version contains the necessary fix to properly sanitize input and prevent the traversal bypass.
- No Workaround: Due to the nature of the vulnerability, there is no effective configuration-based workaround. Patching is the only complete solution.
- Security Best Practices: As a general rule, always run applications like pyLoad with the minimum necessary system permissions (principle of least privilege) to limit the potential impact of any future vulnerability. Regularly updating all software components is a foundational security practice.
For the latest updates on vulnerabilities and patches affecting open-source tools, monitor our security news section.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-29778?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.ym...
joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a resource exhaustion vulnerability in joserfc allows ...
Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The ...
Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using...
Other Python Vulnerabilities
Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.ym...
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows th...
joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a resource exhaustion vulnerability in joserfc allows ...
Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sql...