GHSA-x698-5hjm-w2m5: pyLoad is vulnerable to attacks that bypass localhost restrictions, enabling the creation of arbitrary packages
7.5
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
7/8/2025
Updated
7/8/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pyload-ng | pip | <= 0.5.0b3.dev88 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability exists in the local_check decorator, which improperly uses the user-controllable HTTP_HOST header to verify if a request originates from localhost. An attacker can spoof this header to bypass the access control. The patch removes the check for the HTTP_HOST header, leaving only the check for REMOTE_ADDR, which is a more reliable way to determine the origin of a request. The add function is an example of a function that is protected by this vulnerable decorator, and would appear in a runtime profile during exploitation of this vulnerability.