pyLoad is a free and open-source download manager written in Python. Versions before 0.5.0b3.dev97 are vulnerable to path traversal during password verification of certain encrypted 7z archives (encrypted files with non-encrypted headers), causing arbitrary file deletion outside of the extraction directory. During password verification, pyLoad derives an archive entry name from 7z listing output and treats it as a filesystem path without constraining it to the extraction directory. This issue has been fixed in version 0.5.0b3.dev97.
Use CWE-22, Pyload vendor hub and Pyload product page to widen CVE-2026-32808 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-33992, CVE-2024-47821 and CVE-2024-32880 for nearby disclosures in the same product family.