Description
pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issue has been patched in version 0.5.0b3.dev91.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf
Patch x_refsource_misc
https://github.com/pyload/pyload/commit/134edcdf6e2a10c393743c254da3d9d90b74258f
Various Sources x_refsource_misc
https://github.com/pyload/pyload/blob/develop/src/pyload/core/database/file_database.py#L271
Scores
CVSS v4
7.8
EPSS
0.0005
EPSS Percentile
14.8%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-89
Status
published
Products (2)
pyload/pyload
< 0.5.0b3.dev91
pypi/pyload-ng
0 - 0.5.0b3.dev91PyPI
Published
Aug 11, 2025
Tracked Since
Feb 18, 2026