Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27479: CWE-918: Server-Side Request Forgery (SSRF) in ellite Wallos

0
High
VulnerabilityCVE-2026-27479cvecve-2026-27479cwe-918
Published: Sat Feb 21 2026 (02/21/2026, 08:15:19 UTC)
Source: CVE Database V5
Vendor/Project: ellite
Product: Wallos

Description

Wallos is an open-source, self-hostable personal subscription tracker. Versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the subscription and payment logo/icon upload functionality. The application validates the IP address of the provided URL before making the request, but allows HTTP redirects (CURLOPT_FOLLOWLOCATION = true), enabling an attacker to bypass the IP validation and access internal resources, including cloud instance metadata endpoints. The getLogoFromUrl() function validates the URL by resolving the hostname and checking if the resulting IP is in a private or reserved range using FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE. However, the subsequent cURL request is configured with CURLOPT_FOLLOWLOCATION = true and CURLOPT_MAXREDIRS = 3, which means the request will follow HTTP redirects without re-validating the destination IP. This issue has been fixed in version 4.6.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:42:09 UTC

Technical Analysis

The vulnerability CVE-2026-27479 in ellite Wallos (<=4.6.0) is a Server-Side Request Forgery (SSRF) issue rooted in improper handling of HTTP redirects during URL validation in the logo/icon upload functionality. Wallos attempts to prevent SSRF by resolving the hostname of the user-supplied URL and checking if the resolved IP address belongs to private or reserved IP ranges using PHP's FILTER_FLAG_NO_PRIV_RANGE and FILTER_FLAG_NO_RES_RANGE flags. However, the subsequent cURL request used to fetch the logo is configured with CURLOPT_FOLLOWLOCATION set to true and CURLOPT_MAXREDIRS set to 3, allowing the request to follow up to three HTTP redirects without revalidating the IP addresses of the redirected URLs. An attacker can exploit this by providing a URL that initially resolves to a valid public IP but redirects to internal IP addresses or cloud instance metadata endpoints (e.g., AWS, Azure, GCP metadata services). This bypasses the IP validation and allows the attacker to make the server perform unauthorized requests to internal resources, potentially leaking sensitive data such as credentials or configuration details. The vulnerability does not require user interaction but does require low-level privileges to upload logos. The issue was addressed in Wallos version 4.6.1 by disabling or properly handling redirects during URL fetching or by revalidating IPs after redirects. No known exploits are reported in the wild as of publication. The CVSS v3.1 base score is 7.7, reflecting network attack vector, low complexity, low privileges required, no user interaction, and high confidentiality impact with no integrity or availability impact.

Potential Impact

This SSRF vulnerability can lead to unauthorized internal network access from the vulnerable Wallos server, potentially exposing sensitive internal services and cloud metadata endpoints. Attackers can leverage this to extract confidential information such as cloud instance credentials, internal APIs, or configuration data, which can facilitate further attacks like privilege escalation, lateral movement, or data exfiltration. Organizations running affected Wallos versions may face data breaches, loss of confidentiality, and increased risk of compromise of their cloud infrastructure. Since Wallos is a self-hosted personal subscription tracker, the impact may vary depending on the deployment environment, but any deployment within corporate or cloud environments is at risk. The vulnerability does not affect data integrity or availability directly but can be a stepping stone for more severe attacks. The ease of exploitation and the potential to access sensitive internal resources make this a significant threat for organizations relying on Wallos versions prior to 4.6.1.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Wallos to version 4.6.1 or later where the issue is fixed. If upgrading is not immediately possible, administrators should disable or restrict the logo/icon upload functionality to trusted URLs only or disable HTTP redirects in the cURL requests by setting CURLOPT_FOLLOWLOCATION to false. Additionally, implementing network-level controls such as firewall rules to restrict outbound HTTP requests from the Wallos server to internal IP ranges and cloud metadata endpoints can reduce risk. Monitoring and logging outbound HTTP requests from Wallos can help detect exploitation attempts. Employing web application firewalls (WAFs) with SSRF detection rules may provide additional protection. Finally, reviewing cloud instance metadata service access policies and using metadata service protection mechanisms (e.g., AWS IMDSv2) can limit the impact of SSRF attacks targeting cloud environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T19:46:03.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69996d8dbe58cf853b6e3314

Added to database: 2/21/2026, 8:32:13 AM

Last enriched: 2/28/2026, 12:42:09 PM

Last updated: 4/7/2026, 12:24:03 PM

Views: 153

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses