{"id":"CVE-2024-22416","summary":"Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation","details":"pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade.","aliases":["GHSA-pgpj-v85q-h5fm","PYSEC-2024-17"],"modified":"2026-04-10T05:09:11.856Z","published":"2024-01-17T23:48:31.422Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/22xxx/CVE-2024-22416.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-352"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/22xxx/CVE-2024-22416.json"},{"type":"ADVISORY","url":"https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22416"},{"type":"FIX","url":"https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e"},{"type":"FIX","url":"https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pyload/pyload","events":[{"introduced":"0"},{"fixed":"1374c824271cb7e927740664d06d2e577624ca3e"}]},{"type":"GIT","repo":"https://github.com/pyload/pyload","events":[{"introduced":"0"},{"fixed":"c7cdc18ad9134a75222974b39e8b427c4af845fc"}]},{"type":"GIT","repo":"https://github.com/pyload/pyload","events":[{"introduced":"0"},{"fixed":"1374c824271cb7e927740664d06d2e577624ca3e"}]},{"type":"GIT","repo":"https://github.com/pyload/pyload","events":[{"introduced":"0"},{"fixed":"c7cdc18ad9134a75222974b39e8b427c4af845fc"}]}],"versions":["v0.1","v0.1.1","v0.2","v0.2.1","v0.2.2","v0.3","v0.3.1","v0.3.2","v0.4","v0.4.1","v0.4.2","v0.4.3","v0.4.4","v0.4.5","v0.4.6","v0.4.7","v0.4.8","v0.4.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-22416.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"0.5.0b3.dev78"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}