CVE-2026-35459
CRITICALpyLoad has SSRF fix bypass via HTTP redirect
Title source: cnaDescription
pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, pyLoad has a server-side request forgery (SSRF) vulnerability. The fix for CVE-2026-33992 added IP validation to BaseDownloader.download() that checks the hostname of the initial download URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, causing it to automatically follow HTTP redirects. Redirect targets are never validated against the SSRF filter. An authenticated user with ADD permission can bypass the SSRF fix by submitting a URL that redirects to an internal address.
Scores
CVSS v3
9.1
EPSS
0.0004
EPSS Percentile
10.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-918
Status
published
Products (3)
pyload/pyload
<= 0.5.0b3.dev96
pyload-ng_project/pyload-ng
< 0.5.0b3.dev97
pypi/pyload-ng
0PyPI
Published
Apr 06, 2026
Tracked Since
Apr 07, 2026