๐Ÿ” CVE Alert

CVE-2026-33738

UNKNOWN 0.0

Lychee Vulnerable to Stored XSS via Photo Description in RSS/Atom/JSON Feed (No Sanitization on Public Endpoint)

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
30th

Lychee is a free, open-source photo-management tool. Prior to version 7.5.3, the photo `description` field is stored without HTML sanitization and rendered using `{!! $item->summary !!}` (Blade unescaped output) in the RSS, Atom, and JSON feed templates. The `/feed` endpoint is publicly accessible without authentication, allowing any RSS reader to execute attacker-controlled JavaScript. Version 7.5.3 fixes the issue.

CWE CWE-79
Vendor lycheeorg
Product lychee
Published Mar 26, 2026
Last Updated Mar 27, 2026
Stay Ahead of the Next One

Get instant alerts for lycheeorg lychee

Be the first to know when new unknown vulnerabilities affecting lycheeorg lychee are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

LycheeOrg / Lychee
< 7.5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-5574-7f3r-hm9j github.com: https://github.com/LycheeOrg/Lychee/pull/4218 github.com: https://github.com/LycheeOrg/Lychee/commit/d2e2606a0223d5a384d5b806db1b31eb587adc5c github.com: https://github.com/LycheeOrg/Lychee/releases/tag/v7.5.3