Ad

CVE-2026-33399

HIGH CVSS 3.1: 7.7 EPSS 0.03%
Updated Mar 26, 2026
PHP
Parameter Value
CVSS 7.7 (HIGH)
Affected Versions before 4.7.0
Fixed In 4.7.0
Type CWE-918 (Server-Side Request Forgery (SSRF))
Vendor PHP
Public PoC No

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to the test* notification endpoints but not to the corresponding save* endpoints.

An authenticated user can save an internal/private IP address as a notification URL, and when the cron job sendnotifications.php executes, the request is sent to the internal IP without any SSRF validation. This issue has been patched in version 4.7.0.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Wallosapp Wallos
cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*
4.7.0