Логотип exploitDog
bind:CVE-2025-61773
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-61773

Количество 3

Количество 3

nvd логотип

CVE-2025-61773

4 месяца назад

pyLoad is a free and open-source download manager written in Python. In versions prior to 0.5.0b3.dev91, pyLoad web interface contained insufficient input validation in both the Captcha script endpoint and the Click'N'Load (CNL) Blueprint. This flaw allowed untrusted user input to be processed unsafely, which could be exploited by an attacker to inject arbitrary content into the web UI or manipulate request handling. The vulnerability could lead to client-side code execution (XSS) or other unintended behaviors when a malicious payload is submitted. user-supplied parameters from HTTP requests were not adequately validated or sanitized before being passed into the application logic and response generation. This allowed crafted input to alter the expected execution flow. CNL (Click'N'Load) blueprint exposed unsafe handling of untrusted parameters in HTTP requests. The application did not consistently enforce input validation or encoding, making it possible for an attacker to craft malicio

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2025-61773

4 месяца назад

pyLoad is a free and open-source download manager written in Python. I ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-cjjf-27cc-pvmv

4 месяца назад

pyLoad CNL and captcha handlers allow Code Injection via unsanitized parameters

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-61773

pyLoad is a free and open-source download manager written in Python. In versions prior to 0.5.0b3.dev91, pyLoad web interface contained insufficient input validation in both the Captcha script endpoint and the Click'N'Load (CNL) Blueprint. This flaw allowed untrusted user input to be processed unsafely, which could be exploited by an attacker to inject arbitrary content into the web UI or manipulate request handling. The vulnerability could lead to client-side code execution (XSS) or other unintended behaviors when a malicious payload is submitted. user-supplied parameters from HTTP requests were not adequately validated or sanitized before being passed into the application logic and response generation. This allowed crafted input to alter the expected execution flow. CNL (Click'N'Load) blueprint exposed unsafe handling of untrusted parameters in HTTP requests. The application did not consistently enforce input validation or encoding, making it possible for an attacker to craft malicio

CVSS3: 8.1
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-61773

pyLoad is a free and open-source download manager written in Python. I ...

CVSS3: 8.1
0%
Низкий
4 месяца назад
github логотип
GHSA-cjjf-27cc-pvmv

pyLoad CNL and captcha handlers allow Code Injection via unsanitized parameters

CVSS3: 8.1
0%
Низкий
4 месяца назад

Уязвимостей на страницу