CVE-2025-57751
BaseFortify
Publication date: 2025-08-21
Last updated on: 2025-08-22
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pyload | pyload | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in pyLoad occurs because the 'jk' parameter in the pyLoad CNL Blueprint is not properly verified. The input provided by the user for the 'jk' parameter is directly evaluated using dykpy.evaljs(), which can cause the server's CPU to become fully occupied and the web user interface to become unresponsive.
How can this vulnerability impact me? :
The vulnerability can cause a denial of service condition by fully occupying the server CPU and making the web user interface unresponsive. This can disrupt normal operations and prevent users from accessing or managing downloads through the pyLoad interface.
What immediate steps should I take to mitigate this vulnerability?
Upgrade pyLoad to version 0.5.0b3.dev92 or later, where this vulnerability is fixed.