๐Ÿ” CVE Alert

CVE-2026-41688

HIGH 7.7

Incomplete fix for CVE-2026-33399: SSRF in Wallos

CVSS Score
7.7
EPSS Score
0.0%
EPSS Percentile
0th

Wallos is an open-source, self-hostable personal subscription tracker. In versions 4.8.4 and prior, the incomplete SSRF fix in Wallos validates webhook URLs via gethostbyname() but passes the original hostname to cURL without CURLOPT_RESOLVE pinning on 10 of 11 outbound HTTP endpoints, leaving a DNS rebinding TOCTOU window. At time of publication, there are no publicly available patches.

CWE CWE-918
Vendor ellite
Product wallos
Published May 7, 2026
Last Updated May 7, 2026
Stay Ahead of the Next One

Get instant alerts for ellite wallos

Be the first to know when new high vulnerabilities affecting ellite wallos are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

ellite / Wallos
<= 4.8.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ellite/Wallos/security/advisories/GHSA-h4g7-xv3v-q73g github.com: https://github.com/ellite/Wallos/commit/e87387f0ebb540cd33e6dfda7181db9db650ecef