Severity:

CRITICAL RISK

(9.8)

Authorization Bypass via Host Header Spoofing (CWE-639) in pyLoad ClickNLoad

CVE-2026-33511

Published:

Mar 24, 2026

Status:

Analyzed

Summary

Affected Context

Exploit Preconditions

Why This Happens

Potential Impact

General Mitigation Guidance

How Teams Detect Issues Like This

Frequently Asked Questions

Source

NDV

Vulnerability Type

Vulnerability Type

Category:

Authorization Bypass

CWE:

CWE-639

Impact:

Remote, unauthenticated access to localhost-restricted functionality with file write and script execution capabilities

Severity:

CRITICAL RISK

(9.8)

CVSS Version:

3.1

Vulnerability Type

Category:

Authorization Bypass

CWE:

CWE-639

Impact:

Remote, unauthenticated access to localhost-restricted functionality with file write and script execution capabilities

Severity:

CRITICAL RISK

(9.8)

CVSS Version:

3.1

Catch This CVE While Code Is Being Written

Detect vulnerable code directly in pull requests, so CVEs are fixed before merge.