CVE-2025-7346: pyLoad is vulnerable to attacks that bypass localhost restrictions, enabling the creation of arbitrary packages
7.5
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pyload-ng | pip | <= 0.5.0b3.dev88 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability lies in the local_check decorator function located in src/pyload/webui/app/blueprints/cnl_blueprint.py. This function is responsible for ensuring that certain routes are only accessible from the localhost. The vulnerability is caused by an insecure check on the HTTP_HOST header, which can be manipulated by an attacker. The provided PoC demonstrates that by setting the Host header to 127.0.0.1:9666, an unauthenticated attacker can bypass this check. The fixing commit f4e2d12416ba2dfac7b036d5c8d6dab5461b9840 removes the HTTP_HOST check from the local_check function, thus mitigating the vulnerability. Any function decorated with local_check, such as the add function in the same file, would be affected, but the root cause of the vulnerability is within local_check itself.