CVE-2026-30841

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, passwordreset.php outputs $_GET["token"] and $_GET["email"] directly into HTML input value attributes using <?= $token ?> and <?= $email ?> without calling htmlspecialchars(). This allows reflected XSS by breaking out of the attribute context. This issue has been patched in version 4.6.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*

History

11 Mar 2026, 18:08

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*
First Time Wallosapp wallos
Wallosapp
References () https://github.com/ellite/Wallos/commit/e8a513591dbbf885966e2ef55c38622785b9060d - () https://github.com/ellite/Wallos/commit/e8a513591dbbf885966e2ef55c38622785b9060d - Patch
References () https://github.com/ellite/Wallos/releases/tag/v4.6.2 - () https://github.com/ellite/Wallos/releases/tag/v4.6.2 - Release Notes
References () https://github.com/ellite/Wallos/security/advisories/GHSA-75hc-fc26-9797 - () https://github.com/ellite/Wallos/security/advisories/GHSA-75hc-fc26-9797 - Exploit, Vendor Advisory
Summary
  • (es) Wallos es un rastreador de suscripciones personales de código abierto y autoalojable. Antes de la versión 4.6.2, passwordreset.PHP muestra $_GET['token'] y $_GET['email'] directamente en los atributos de valor de entrada HTML usando y sin llamar a htmlspecialchars(). Esto permite XSS reflejado al salir del contexto del atributo. Este problema ha sido parcheado en la versión 4.6.2.

07 Mar 2026, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-07 06:16

Updated : 2026-03-11 18:08


NVD link : CVE-2026-30841

Mitre link : CVE-2026-30841

CVE.ORG link : CVE-2026-30841


JSON object : View

Products Affected

wallosapp

  • wallos
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')