PT-2026-30897 · Pyload · Pyload
Published
2026-04-07
·
Updated
2026-04-07
·
CVE-2026-35592
CVSS v3.1
5.3
Medium
| AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N |
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the safe extractall() function in src/pyload/plugins/extractors/UnTar.py uses os.path.commonprefix() for its path traversal check, which performs character-level string comparison rather than path-level comparison. This allows a specially crafted tar archive to write files outside the intended extraction directory. The correct function os.path.commonpath() was added to the codebase in the CVE-2026-32808 fix (commit 5f4f0fa) but was never applied to safe extractall(), making this an incomplete fix. This vulnerability is fixed in 0.5.0b3.dev97.
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Pyload