CVE-2026-33992
MEDIUMpyLoad: Server-Side Request Forgery via Download Link Submission Enables Cloud Metadata Exfiltration
Title source: cnaDescription
pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch.
Scores
CVSS v3
6.5
EPSS
0.0003
EPSS Percentile
7.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-918
Status
published
Products (3)
pyload/pyload
0.5.0
pyload/pyload
< 0.5.0b3.dev97
pypi/pyload-ng
0PyPI
Published
Mar 27, 2026
Tracked Since
Mar 29, 2026