pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch.
Use CWE-918, Pyload vendor hub and Pyload product page to widen CVE-2026-33992 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-47821, CVE-2024-32880 and CVE-2026-41133 for nearby disclosures in the same product family.