Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pyload-ng
  4. ›
  5. CVE-2025-61773

CVE-2025-61773: pyLoad CNL and captcha handlers allow Code Injection via unsanitized parameters

October 9, 2025 (updated October 13, 2025)

pyLoad web interface contained insufficient input validation in both the Captcha script endpoint and the Click’N’Load (CNL) Blueprint. This flaw allowed untrusted user input to be processed unsafely, which could be exploited by an attacker to inject arbitrary content into the web UI or manipulate request handling. The vulnerability could lead to client-side code execution (XSS) or other unintended behaviors when a malicious payload is submitted.

user-supplied parameters from HTTP requests were not adequately validated or sanitized before being passed into the application logic and response generation. This allowed crafted input to alter the expected execution flow. CNL (Click’N’Load) blueprint exposed unsafe handling of untrusted parameters in HTTP requests. The application did not consistently enforce input validation or encoding, making it possible for an attacker to craft malicious requests.

References

  • github.com/advisories/GHSA-cjjf-27cc-pvmv
  • github.com/pyload/pyload
  • github.com/pyload/pyload/commit/5823327d0b797161c7195a1f660266d30a69f0ca
  • github.com/pyload/pyload/pull/4624
  • github.com/pyload/pyload/security/advisories/GHSA-cjjf-27cc-pvmv
  • nvd.nist.gov/vuln/detail/CVE-2025-61773

Code Behaviors & Features

Detect and mitigate CVE-2025-61773 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.5.0b3.dev91

Fixed versions

  • 0.5.0b3.dev91

Solution

Upgrade to version 0.5.0b3.dev91 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-116: Improper Encoding or Escaping of Output
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

pypi/pyload-ng/CVE-2025-61773.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 20 Oct 2025 00:19:50 +0000.