Server-side Request Forgery (SSRF) Affecting pyload-ng package, versions [,0.5.0b3.dev97)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PYLOADNG-15917134
  • published6 Apr 2026
  • disclosed4 Apr 2026
  • creditkodareef5

Introduced: 4 Apr 2026

NewCVE-2026-35459  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade pyload-ng to version 0.5.0b3.dev97 or higher.

Overview

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the download function. An authenticated attacker with ADD permission can access internal network resources and sensitive cloud metadata by submitting a URL that redirects to an internal address, thereby bypassing the intended network access restrictions.

Note: This vulnerability is the result of an insufficient fix for a previously identified issue CVE-2026-33992

CVSS Base Scores

version 4.0
version 3.1