Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33644: CWE-918: Server-Side Request Forgery (SSRF) in LycheeOrg Lychee

0
Low
VulnerabilityCVE-2026-33644cvecve-2026-33644cwe-918
Published: Thu Mar 26 2026 (03/26/2026, 20:04:18 UTC)
Source: CVE Database V5
Vendor/Project: LycheeOrg
Product: Lychee

Description

Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the SSRF protection in `PhotoUrlRule.php` can be bypassed using DNS rebinding. The IP validation check (line 86-89) only activates when the hostname is an IP address. When a domain name is used, `filter_var($host, FILTER_VALIDATE_IP)` returns `false`, skipping the entire check. Version 7.5.2 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:07:56 UTC

Technical Analysis

CVE-2026-33644 is a Server-Side Request Forgery (SSRF) vulnerability identified in Lychee, a free and open-source photo-management software. The vulnerability exists in the SSRF protection mechanism implemented in the file `PhotoUrlRule.php`. Specifically, the IP validation check (lines 86-89) only activates when the hostname is an IP address. When a domain name is provided, the function `filter_var($host, FILTER_VALIDATE_IP)` returns false, causing the IP validation logic to be skipped entirely. This allows attackers to exploit DNS rebinding techniques to bypass SSRF protections. DNS rebinding involves manipulating DNS responses so that a domain name resolves to different IP addresses, including internal network addresses, enabling attackers to coerce the server into making unauthorized requests to internal services or other restricted resources. The vulnerability affects all Lychee versions prior to 7.5.2, which includes the vulnerable SSRF protection code. The issue was published on March 26, 2026, and has a CVSS 4.0 base score of 2.3, reflecting a low severity due to the need for low privileges and partial attack complexity. No public exploits are known to exist at this time. The vulnerability is classified under CWE-918 (Server-Side Request Forgery). The patch in version 7.5.2 addresses this by correcting the validation logic to properly handle domain names and prevent bypass via DNS rebinding.

Potential Impact

The primary impact of this SSRF vulnerability is that an attacker with low privileges on a vulnerable Lychee installation can coerce the server to send unauthorized HTTP requests to arbitrary internal or external systems. This can lead to information disclosure if internal services respond with sensitive data, or enable further attacks such as port scanning, accessing metadata services in cloud environments, or interacting with internal APIs not exposed externally. However, the overall impact is limited by the low CVSS score, indicating that exploitation requires some level of access (likely authenticated user or low privilege) and that the vulnerability does not directly lead to remote code execution or full system compromise. Organizations running Lychee in environments with sensitive internal networks or cloud metadata services are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack chain but is unlikely to cause immediate critical damage on its own.

Mitigation Recommendations

The primary mitigation is to upgrade Lychee to version 7.5.2 or later, where the SSRF protection logic has been corrected to properly validate domain names and prevent DNS rebinding bypass. Until upgrading is possible, organizations should implement network-level controls such as restricting outbound HTTP requests from the Lychee server to only trusted destinations, using firewall rules or proxy whitelisting. Additionally, internal services that could be targeted by SSRF should enforce strong authentication and authorization to limit the impact of unauthorized requests. Monitoring and logging outbound requests from Lychee can help detect suspicious activity indicative of SSRF exploitation attempts. Developers and administrators should also review any custom plugins or integrations that might bypass standard request validation. Finally, educating users about the risks of SSRF and applying the principle of least privilege to Lychee user accounts can reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T15:23:42.216Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6c6933c064ed76fdc299b

Added to database: 3/27/2026, 6:04:03 PM

Last enriched: 3/27/2026, 6:07:56 PM

Last updated: 3/27/2026, 11:35:45 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses