High (7.1)

Python RCE (CVE-2026-29778)

CVE-2026-29778

pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder p...

Affected: Python

Overview

A high-severity security vulnerability, tracked as CVE-2026-29778, has been identified in the open-source pyLoad download manager. This flaw allows attackers to bypass directory protections, potentially leading to unauthorized file access or manipulation on the server hosting the pyLoad application.

Vulnerability Details

The vulnerability exists in the edit_package() function within pyLoad versions 0.5.0b3.dev13 through 0.5.0b3.dev96. The flaw is a path traversal weakness caused by insufficient input sanitization. Specifically, the application attempts to prevent directory traversal by performing a single-pass replacement of the sequence ../ in the pack_folder parameter. However, this protection is inadequate. An attacker can craft recursive traversal sequences (such as ....//) that, after the simple replacement, reconstruct into the forbidden ../ sequence, successfully bypassing the check. This allows access to files and directories outside the intended restricted folder.

Impact

If successfully exploited, this vulnerability could enable an authenticated attacker to read, overwrite, or delete sensitive files on the underlying operating system. The impact severity depends on the permissions of the pyLoad process. In many deployments, this could lead to a full compromise of the host server, data theft, or service disruption. For administrators, understanding such flaws is crucial, as they are a common vector in larger attack chains that can lead to significant data breaches. You can review recent incidents at breach reports.

Affected Versions

  • pyLoad versions 0.5.0b3.dev13 through 0.5.0b3.dev96 are confirmed vulnerable.

Remediation and Mitigation

The primary and most critical action is to update the pyLoad software immediately.

  1. Patch Immediately: Upgrade pyLoad to version 0.5.0b3.dev97 or any later release. This version contains the necessary fix to properly sanitize input and prevent the traversal bypass.
  2. No Workaround: Due to the nature of the vulnerability, there is no effective configuration-based workaround. Patching is the only complete solution.
  3. Security Best Practices: As a general rule, always run applications like pyLoad with the minimum necessary system permissions (principle of least privilege) to limit the potential impact of any future vulnerability. Regularly updating all software components is a foundational security practice.

For the latest updates on vulnerabilities and patches affecting open-source tools, monitor our security news section.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-29778?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Other Python Vulnerabilities

View all Python vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.