Back to list

PyLoad vulnerable to unauthenticated traceback disclosure via global exception handler in WebUI — CVE-2026-44226

GitHub · GitHub · CVE-2026-44226

ID
CVE-2026-44226
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
medium
CVSS
5.3
EPSS
0.00038

Summary

### Summary `pyload-ng` WebUI returns full Python traceback details to clients on unhandled exceptions. Because `/web/<path:filename>` is reachable without authentication and renders attacker-controlled template names, an unauthenticated user can reliably trigger a server exception (for example by requesting a non-existent template) and receive internal stack traces in the HTTP response. ### Details The issue is…

Product

pip: pyload-ng

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories