Safety vulnerability ID: 80314
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the pyload-ng package are vulnerable to Code Injection due to unsanitized parameters in the Captcha script handler and the Click'N'Load (CNL) blueprint of the web interface. The CNL /flash/addcrypted2 endpoint and related handlers accept user-controlled fields such as the jk and package parameters and propagate them into the UI without proper validation or encoding, enabling attacker-supplied JavaScript to be injected and executed in the client browser.
Latest version: 0.5.0b3.dev92
The free and open-source Download Manager written in pure Python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application