Safety vulnerability ID: 72085
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of yt-dlp and youtube-dl, command-line audio/video downloaders, are vulnerable to arbitrary file creation due to not limiting downloaded file extensions. This vulnerability could lead to path traversal on Windows, where arbitrary filenames can be created in the download folder. Additionally, yt-dlp and youtube-dl read config files from the working directory, which, on Windows, could result in the execution of arbitrary code if executables are run from the yt-dlp or youtube-dl directory. Users should whitelist allowed extensions and avoid downloading to sensitive locations. As a mitigation, use the default output template and ensure the downloaded media's extension is common. Avoid using the generic extractor and use --ignore-config --config-location to specify a safe config location.
# This only affects Windows users
Latest version: 2024.12.6
A feature-rich command-line audio/video downloader
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application