CVE-2026-40071
Received Received - Intake
Improper Access Control in pyLoad WebUI Allows Unauthorized Modifications

Publication date: 2026-04-09

Last updated on: 2026-04-28

Assigner: GitHub, Inc.

Description
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the /json/package_order, /json/link_order, and /json/abort_link WebUI JSON endpoints enforce weaker permissions than the core API methods they invoke. This allows authenticated low-privileged users to execute MODIFY operations that should be denied by pyLoad's own permission model. This vulnerability is fixed in 0.5.0b3.dev97.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
pyload pyload to 2026-04-13 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-40071 is a permission mismatch vulnerability in the pyLoad-ng WebUI JSON API. It allows authenticated users with limited permissions (ADD or DELETE) to perform actions that should require higher MODIFY permissions. Specifically, some WebUI JSON endpoints enforce weaker permission checks than the core API methods they call, enabling unauthorized execution of MODIFY-level operations.

  • The endpoints /json/package_order and /json/link_order require only ADD permission but invoke operations that need MODIFY permission.
  • The endpoint /json/abort_link requires only DELETE permission but calls an operation requiring MODIFY permission.

This flaw allows low-privileged users to reorder download packages and files or abort downloads without proper authorization, violating pyLoad's intended permission model.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in pyLoad-ng allows authenticated low-privileged users to perform unauthorized MODIFY operations, such as reordering download queues and aborting downloads, which impacts the integrity and availability of the system.

While the CVE description and resources do not explicitly mention compliance with standards like GDPR or HIPAA, improper authorization and permission bypass vulnerabilities can potentially lead to non-compliance with such regulations if they result in unauthorized data modification or service disruption.

Specifically, regulations like GDPR and HIPAA require appropriate access controls to protect data integrity and availability. This vulnerability violates the intended permission model, which could be seen as a failure to enforce adequate access controls.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users with limited permissions to perform actions that should be restricted, leading to integrity and availability issues.

  • Integrity Impact: Unauthorized reordering of download queues and files by users without MODIFY permission.
  • Availability Impact: Unauthorized aborting of active downloads by users without MODIFY permission.

The scope of the impact is horizontal privilege escalation among authenticated non-admin users, meaning no admin takeover is possible but users can perform unauthorized modifications within their environment.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing whether users with limited permissions (ADD or DELETE) can perform MODIFY-level operations via the WebUI JSON API endpoints.

Specifically, you can attempt HTTP POST requests to the following endpoints using credentials of a low-privileged user:

  • POST /json/package_order to test reordering packages
  • POST /json/link_order to test reordering files
  • POST /json/abort_link to test aborting downloads

If these requests succeed (HTTP 200) and the operations are executed despite the user lacking MODIFY permission, the vulnerability is present.

Example command using curl for a user with ADD permission to test package reorder:

  • curl -X POST -u user:add_permission_password https://your-pyload-instance/json/package_order -d '{"order": [...]}'

Similarly, test the other endpoints with appropriate user credentials and payloads to confirm unauthorized MODIFY operations.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade pyLoad-ng to version 0.5.0b3.dev97 or later, where this permission enforcement issue is fixed.

Until the upgrade can be applied, consider restricting access to the WebUI JSON API endpoints to trusted users only, especially limiting users with ADD or DELETE permissions from accessing these endpoints.

Additionally, review and tighten user permissions to minimize the number of users with ADD or DELETE permissions who could exploit this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart