Miggo Logo

CVE-2025-7346: pyLoad is vulnerable to attacks that bypass localhost restrictions, enabling the creation of arbitrary packages

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.39174%
Published
7/8/2025
Updated
7/8/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pyload-ngpip<= 0.5.0b3.dev88

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in the local_check decorator function located in src/pyload/webui/app/blueprints/cnl_blueprint.py. This function is responsible for ensuring that certain routes are only accessible from the localhost. The vulnerability is caused by an insecure check on the HTTP_HOST header, which can be manipulated by an attacker. The provided PoC demonstrates that by setting the Host header to 127.0.0.1:9666, an unauthenticated attacker can bypass this check. The fixing commit f4e2d12416ba2dfac7b036d5c8d6dab5461b9840 removes the HTTP_HOST check from the local_check function, thus mitigating the vulnerability. Any function decorated with local_check, such as the add function in the same file, would be affected, but the root cause of the vulnerability is within local_check itself.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *ny un*ut**nti**t** *tt**k*r **n *yp*ss t** lo**l*ost r*stri*tions pos** *y t** *ppli**tion *n* utiliz* t*is to *r**t* *r*itr*ry p**k***s. ### **t*ils *ny un*ut**nti**t** *tt**k*r **n *yp*ss t** lo**l*ost r*stri*tions pos** *y t** *ppli*

Reasoning

T** vuln*r**ility li*s in t** `lo**l_****k` ***or*tor *un*tion lo**t** in `sr*/pylo**/w**ui/*pp/*lu*prints/*nl_*lu*print.py`. T*is *un*tion is r*sponsi*l* *or *nsurin* t**t **rt*in rout*s *r* only ****ssi*l* *rom t** lo**l*ost. T** vuln*r**ility is *