CVE-2025-54802

pyLoad · pyLoad is the free and Multiple Products

A critical path traversal vulnerability, identified as CVE-2025-54802, has been discovered in the pyLoad download manager.

Executive summary

A critical path traversal vulnerability, identified as CVE-2025-54802, has been discovered in the pyLoad download manager. This flaw allows an unauthenticated attacker to access, modify, or create files outside of the intended directories on the server, potentially leading to a full system compromise. Due to its critical severity (CVSS 9.8), immediate remediation is required to prevent data breaches and unauthorized server access.

Vulnerability

The vulnerability is a path traversal flaw within the Click'n'Load (CNL) functionality of pyLoad. An attacker can craft a malicious request to the CNL endpoint, manipulating a package parameter with "dot-dot-slash" (../) sequences. Because the application fails to properly sanitize this user-supplied input, the attacker can navigate the file system and write or read files in arbitrary locations, limited only by the permissions of the user account running the pyLoad process. Successful exploitation could allow an attacker to read sensitive configuration files, overwrite critical system files, or upload a web shell to achieve remote code execution.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high potential for significant business disruption. Exploitation could lead to a complete loss of confidentiality, integrity, and availability of the affected server. Specific risks include the theft of sensitive company or user data, deployment of ransomware, system downtime, and the use of the compromised server as a pivot point to attack other systems within the network. The reputational damage and financial costs associated with a data breach or system compromise are substantial.

Remediation

Immediate Action: Immediately update all instances of pyLoad to the latest patched version as recommended by the vendor. After patching, review system logs, particularly pyLoad and web server access logs, for any signs of exploitation attempts that may have occurred prior to the update.

Proactive Monitoring: Implement continuous monitoring of logs for suspicious activity targeting the pyLoad application. Specifically, search for log entries containing path traversal sequences (e.g., ../, ..%2f, %2e%2e%2f) in requests related to the CNL feature. Monitor for unexpected file creation or modification in sensitive system directories and for unusual outbound network connections from the server hosting pyLoad.

Compensating Controls: If immediate patching is not feasible, implement the following controls:

  • Place a Web Application Firewall (WAF) in front of the pyLoad instance with rules designed to block path traversal attacks.
  • Run the pyLoad application in a restricted, containerized, or sandboxed environment with strict file system permissions to limit the impact of a potential traversal.
  • Restrict network access to the pyLoad web interface, allowing connections only from trusted IP addresses.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical severity (CVSS 9.8) of this vulnerability, we strongly recommend that immediate action is taken. The primary course of action is to apply the vendor-supplied patches to all affected systems without delay. Although this CVE is not yet on the CISA KEV list, its high impact score makes it an attractive target for attackers. Organizations unable to patch immediately must implement the recommended compensating controls, such as WAF rules and enhanced monitoring, to mitigate the significant risk of a full system compromise.