CVE-2025-54802

CRITICAL

Pyload-ng < 0.5.0b3.dev90 - Path Traversal

Title source: rule
STIX 2.1

Description

pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing unauthenticated attackers to write arbitrary files outside the designated storage directory. This can be abused to overwrite critical system files, including cron jobs and systemd services, leading to privilege escalation and remote code execution as root. This issue is fixed in version 0.5.0b3.dev90.

Scores

CVSS v3 9.8
EPSS 0.0147
EPSS Percentile 81.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-22
Status published
Products (2)
pyload-ng_project/pyload-ng 0.5.0b3.dev89
pypi/pyload-ng 0 - 0.5.0b3.dev90PyPI
Published Aug 05, 2025
Tracked Since Feb 18, 2026