Description

pyLoad is a free and open-source download manager written in Python. Versions before 0.5.0b3.dev97 are vulnerable to path traversal during password verification of certain encrypted 7z archives (encrypted files with non-encrypted headers), causing arbitrary file deletion outside of the extraction directory. During password verification, pyLoad derives an archive entry name from 7z listing output and treats it as a filesystem path without constraining it to the extraction directory. This issue has been fixed in version 0.5.0b3.dev97.

INFO

Published Date :

2026-03-20T01:45:07.446Z

Last Modified :

2026-03-25T14:29:07.756Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-32808 vulnerability.

Vendors Products
Pyload
  • Pyload
Pyload-ng Project
  • Pyload-ng
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32808.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact