Cyber Posture

CVE-2026-35459

CriticalPublic PoC

Published: 06 April 2026

Published
06 April 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0004 13.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-35459 is a critical-severity SSRF (CWE-918) vulnerability in Pyload-Ng Project Pyload-Ng. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Remote System Discovery (T1018); ranked at the 13.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Remote System Discovery (T1018) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of user-submitted download URLs, including redirect targets, to block SSRF access to internal addresses.

prevent

Mandates timely identification, reporting, and remediation of the specific SSRF redirect bypass flaw in pyLoad via vendor patches.

prevent

Enforces boundary protection to monitor and restrict outbound connections from the pyLoad server to internal network resources.

MITRE ATT&CK Enterprise TechniquesAI

T1018 Remote System Discovery Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

SSRF vulnerability enables forging requests to internal network addresses from the server, directly facilitating remote system discovery (T1018) and network service discovery (T1046) via probing of internal hosts and services.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, pyLoad has a server-side request forgery (SSRF) vulnerability. The fix for CVE-2026-33992 added IP validation to BaseDownloader.download() that checks the hostname of the initial download…

more

URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, causing it to automatically follow HTTP redirects. Redirect targets are never validated against the SSRF filter. An authenticated user with ADD permission can bypass the SSRF fix by submitting a URL that redirects to an internal address.

Deeper analysisAI

CVE-2026-35459 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting pyLoad, a free and open-source download manager written in Python. The issue impacts versions 0.5.0b3.dev96 and earlier. It arises as a bypass of the SSRF fix for CVE-2026-33992, which added IP validation in the BaseDownloader.download() method to check the hostname of the initial download URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, allowing automatic following of HTTP redirects without validating redirect targets against the SSRF filter.

An authenticated user with ADD permission can exploit the vulnerability by submitting a malicious URL that redirects to an internal address, bypassing the SSRF protections. This enables the attacker to forge requests to internal network resources from the pyLoad server. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), reflecting high impacts on confidentiality and integrity.

Mitigation details are available in the pyLoad GitHub security advisory at https://github.com/pyload/pyload/security/advisories/GHSA-7gvf-3w72-p2pg and the fixing commit at https://github.com/pyload/pyload/commit/33c55da084320430edfd941b60e3da0eb1be9443.

Details

CWE(s)

Affected Products

pyload-ng project
pyload-ng
≤ 0.5.0b3.dev97

CVEs Like This One

CVE-2026-35187Same product: Pyload-Ng Project Pyload-Ng
CVE-2025-54802Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-35463Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-29778Same product: Pyload-Ng Project Pyload-Ng
CVE-2025-22399Shared CWE-918
CVE-2026-33509Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-33511Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-32808Same product: Pyload-Ng Project Pyload-Ng
CVE-2026-5936Shared CWE-918
CVE-2026-27696Shared CWE-918

References