CVE-2026-29778
The editpackage() function implements insufficient sanitization for the packfolder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences.
Exploitation
An authenticated user with MODIFY permission can bypass the sanitization by submitting a payload such as:
pack_folder=..././..././..././tmp
After the single-pass replacement, this becomes:
../../../tmp
Because the traversal sequences are not properly validated, the resulting normalized path escapes the intended storage directory and writes files to /tmp or other locations.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/pyload/pyload/security/advisories/GHSA-6px9-j4qr-xfjw, https://nvd.nist.gov/vuln/detail/CVE-2026-29778, https://github.com/pyload/pyload
