Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pyload-ng
  4. ›
  5. CVE-2026-41133

CVE-2026-41133: pyLoad has Stale Session Privilege After Role/Permission Change (Privilege Revocation Bypass)

April 14, 2026 (updated April 24, 2026)

pyLoad caches role and permission in the session at login and continues to authorize requests using these cached values, even after an admin changes the user’s role/permissions in the database.

As a result, an already logged-in user can keep old (revoked) privileges until logout/session expiry, enabling continued privileged actions.

This is a core authorization/session-consistency issue and is not resolved by toggling an optional security feature.

References

  • github.com/advisories/GHSA-66hx-chf7-3332
  • github.com/pyload/pyload
  • github.com/pyload/pyload/commit/e95804fb0d06cbb07d2ba380fc494d9ff89b68c1
  • github.com/pyload/pyload/security/advisories/GHSA-66hx-chf7-3332
  • nvd.nist.gov/vuln/detail/CVE-2026-41133

Code Behaviors & Features

Detect and mitigate CVE-2026-41133 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.5.0b3.dev97

Solution

Unfortunately, there is no solution available yet.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-613: Insufficient Session Expiration

Source file

pypi/pyload-ng/CVE-2026-41133.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:10 +0000.