CVE-2026-30840

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, there is a server-side request forgery vulnerability in notification testers. This issue has been patched in version 4.6.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*

History

11 Mar 2026, 18:32

Type Values Removed Values Added
CPE cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*
References () https://github.com/ellite/Wallos/commit/e8a513591dbbf885966e2ef55c38622785b9060d - () https://github.com/ellite/Wallos/commit/e8a513591dbbf885966e2ef55c38622785b9060d - Patch
References () https://github.com/ellite/Wallos/releases/tag/v4.6.2 - () https://github.com/ellite/Wallos/releases/tag/v4.6.2 - Release Notes
References () https://github.com/ellite/Wallos/security/advisories/GHSA-mr2c-prqv-hqm8 - () https://github.com/ellite/Wallos/security/advisories/GHSA-mr2c-prqv-hqm8 - Exploit, Mitigation, Vendor Advisory
Summary
  • (es) Wallos es un rastreador de suscripciones personal de código abierto y autoalojable. Antes de la versión 4.6.2, existe una vulnerabilidad de falsificación de petición del lado del servidor en los probadores de notificaciones. Este problema ha sido parcheado en la versión 4.6.2.
First Time Wallosapp wallos
Wallosapp

07 Mar 2026, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-07 06:16

Updated : 2026-03-11 18:32


NVD link : CVE-2026-30840

Mitre link : CVE-2026-30840

CVE.ORG link : CVE-2026-30840


JSON object : View

Products Affected

wallosapp

  • wallos
CWE
CWE-295

Improper Certificate Validation

CWE-918

Server-Side Request Forgery (SSRF)