CVE-2026-30839

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, testwebhooknotifications.php does not validate the target URL against private/reserved IP ranges, enabling full-read SSRF. The server response is returned to the caller. This issue has been patched in version 4.6.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*

History

11 Mar 2026, 18:48

Type Values Removed Values Added
Summary
  • (es) Wallos es un rastreador de suscripciones personal de código abierto y autoalojable. Antes de la versión 4.6.2, testwebhooknotifications.php no valida la URL de destino frente a rangos de IP privados/reservados, lo que permite un SSRF de lectura completa. La respuesta del servidor se devuelve al llamador. Este problema ha sido parcheado en la versión 4.6.2.
First Time Wallosapp wallos
Wallosapp
References () https://github.com/ellite/Wallos/commit/e8a513591dbbf885966e2ef55c38622785b9060d - () https://github.com/ellite/Wallos/commit/e8a513591dbbf885966e2ef55c38622785b9060d - Patch
References () https://github.com/ellite/Wallos/releases/tag/v4.6.2 - () https://github.com/ellite/Wallos/releases/tag/v4.6.2 - Release Notes
References () https://github.com/ellite/Wallos/security/advisories/GHSA-x4qp-xm2c-vqg9 - () https://github.com/ellite/Wallos/security/advisories/GHSA-x4qp-xm2c-vqg9 - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CPE cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*

07 Mar 2026, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-07 06:16

Updated : 2026-03-11 18:48


NVD link : CVE-2026-30839

Mitre link : CVE-2026-30839

CVE.ORG link : CVE-2026-30839


JSON object : View

Products Affected

wallosapp

  • wallos
CWE
CWE-918

Server-Side Request Forgery (SSRF)