Cyber Posture

CVE-2026-32808

HighPublic PoC

Published: 20 March 2026

Published
20 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
EPSS Score 0.0018 39.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32808 is a high-severity Path Traversal (CWE-22) vulnerability in Pyload Pyload. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to File Deletion (T1070.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the path traversal flaw by requiring identification, reporting, and correction of vulnerabilities in pyLoad prior to version 0.5.0b3.dev97.

prevent

Requires validation of untrusted archive entry names derived from 7z listing output before using them as filesystem paths, preventing path traversal outside the extraction directory.

detect

Enables monitoring of filesystem activity to detect unauthorized file deletions resulting from exploitation of the path traversal vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

The path traversal vulnerability directly enables arbitrary file deletion outside the intended directory during processing of a malicious 7z archive, mapping to T1107 File Deletion.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

pyLoad is a free and open-source download manager written in Python. Versions before 0.5.0b3.dev97 are vulnerable to path traversal during password verification of certain encrypted 7z archives (encrypted files with non-encrypted headers), causing arbitrary file deletion outside of the extraction…

more

directory. During password verification, pyLoad derives an archive entry name from 7z listing output and treats it as a filesystem path without constraining it to the extraction directory. This issue has been fixed in version 0.5.0b3.dev97.

Deeper analysisAI

CVE-2026-32808 is a path traversal vulnerability (CWE-22) in pyLoad, a free and open-source download manager written in Python. Versions prior to 0.5.0b3.dev97 are affected during password verification of certain encrypted 7z archives, specifically those with encrypted files but non-encrypted headers. In this process, pyLoad derives an archive entry name from the 7z listing output and uses it as a filesystem path without restricting it to the extraction directory, enabling arbitrary file deletion outside that directory. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H).

A remote attacker can exploit this vulnerability by tricking a user into adding a specially crafted encrypted 7z archive to pyLoad for password verification. No privileges are required, but user interaction is necessary, such as selecting or processing the malicious archive through the download manager's interface. Successful exploitation allows the attacker to delete arbitrary files on the victim's filesystem, with high impact on integrity and availability but no confidentiality impact.

The issue has been addressed in pyLoad version 0.5.0b3.dev97. Additional details are available in the GitHub Security Advisory at https://github.com/pyload/pyload/security/advisories/GHSA-7g4m-8hx2-4qh3.

Details

CWE(s)

Affected Products

pyload
pyload
≤ 0.4.20
pyload-ng project
pyload-ng
0.5.0a5.dev528 — 0.5.0b3.dev97

CVEs Like This One

CVE-2026-33511Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-33509Same product: Pyload-Ng Project Pyload-Ng
CVE-2025-54802Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-42315Same product: Pyload-Ng Project Pyload-Ng
CVE-2025-24960Shared CWE-22
CVE-2025-14520Shared CWE-22
CVE-2026-35187Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-35459Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-29778Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-35464Same product: Pyload Pyload

References