Report: Complete Guide to CVE-2026-33992 - pyLoad: Server-Side Request Forgery via Download Link Submission Enables Cloud M...

Report: Complete Guide to CVE-2026-33992 - pyLoad: Server-Side Request Forgery via Download Link Submission Enables Cloud M...

CVE ID :CVE-2026-33992 Published : March 27, 2026, 11:17 p.m. | 37 minutes ago Description :pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch. Severity: 9.3 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
CRITICAL
Published
March 27, 2026
Affected Product: Python
Attack Vector: network
Impact: SSRF