Command Injection Affecting pyload-ng package, versions [,0.5.0b3.dev97)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.12% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PYLOADNG-15917133
  • published6 Apr 2026
  • disclosed4 Apr 2026
  • creditAxel CORSIEZ

Introduced: 4 Apr 2026

NewCVE-2026-35463  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade pyload-ng to version 0.5.0b3.dev97 or higher.

Overview

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Command Injection through improper handling of plugin configuration options, specifically the avfile parameter in the AntiVirus plugin, which is passed directly to subprocess.Popen without adequate validation. An attacker can execute arbitrary system commands by modifying the avfile and avargs values if they possess SETTINGS permission as a non-admin user.

CVSS Base Scores

version 4.0
version 3.1