CVE-2026-33644: CWE-918: Server-Side Request Forgery (SSRF) in LycheeOrg Lychee
Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the SSRF protection in `PhotoUrlRule.php` can be bypassed using DNS rebinding. The IP validation check (line 86-89) only activates when the hostname is an IP address. When a domain name is used, `filter_var($host, FILTER_VALIDATE_IP)` returns `false`, skipping the entire check. Version 7.5.2 patches the issue.
AI Analysis
Technical Summary
CVE-2026-33644 is a Server-Side Request Forgery (SSRF) vulnerability identified in Lychee, a free and open-source photo-management software. The vulnerability exists in the SSRF protection mechanism implemented in the file `PhotoUrlRule.php`. Specifically, the IP validation check (lines 86-89) only activates when the hostname is an IP address. When a domain name is provided, the function `filter_var($host, FILTER_VALIDATE_IP)` returns false, causing the IP validation logic to be skipped entirely. This allows attackers to exploit DNS rebinding techniques to bypass SSRF protections. DNS rebinding involves manipulating DNS responses so that a domain name resolves to different IP addresses, including internal network addresses, enabling attackers to coerce the server into making unauthorized requests to internal services or other restricted resources. The vulnerability affects all Lychee versions prior to 7.5.2, which includes the vulnerable SSRF protection code. The issue was published on March 26, 2026, and has a CVSS 4.0 base score of 2.3, reflecting a low severity due to the need for low privileges and partial attack complexity. No public exploits are known to exist at this time. The vulnerability is classified under CWE-918 (Server-Side Request Forgery). The patch in version 7.5.2 addresses this by correcting the validation logic to properly handle domain names and prevent bypass via DNS rebinding.
Potential Impact
The primary impact of this SSRF vulnerability is that an attacker with low privileges on a vulnerable Lychee installation can coerce the server to send unauthorized HTTP requests to arbitrary internal or external systems. This can lead to information disclosure if internal services respond with sensitive data, or enable further attacks such as port scanning, accessing metadata services in cloud environments, or interacting with internal APIs not exposed externally. However, the overall impact is limited by the low CVSS score, indicating that exploitation requires some level of access (likely authenticated user or low privilege) and that the vulnerability does not directly lead to remote code execution or full system compromise. Organizations running Lychee in environments with sensitive internal networks or cloud metadata services are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack chain but is unlikely to cause immediate critical damage on its own.
Mitigation Recommendations
The primary mitigation is to upgrade Lychee to version 7.5.2 or later, where the SSRF protection logic has been corrected to properly validate domain names and prevent DNS rebinding bypass. Until upgrading is possible, organizations should implement network-level controls such as restricting outbound HTTP requests from the Lychee server to only trusted destinations, using firewall rules or proxy whitelisting. Additionally, internal services that could be targeted by SSRF should enforce strong authentication and authorization to limit the impact of unauthorized requests. Monitoring and logging outbound requests from Lychee can help detect suspicious activity indicative of SSRF exploitation attempts. Developers and administrators should also review any custom plugins or integrations that might bypass standard request validation. Finally, educating users about the risks of SSRF and applying the principle of least privilege to Lychee user accounts can reduce the attack surface.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-33644: CWE-918: Server-Side Request Forgery (SSRF) in LycheeOrg Lychee
Description
Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the SSRF protection in `PhotoUrlRule.php` can be bypassed using DNS rebinding. The IP validation check (line 86-89) only activates when the hostname is an IP address. When a domain name is used, `filter_var($host, FILTER_VALIDATE_IP)` returns `false`, skipping the entire check. Version 7.5.2 patches the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33644 is a Server-Side Request Forgery (SSRF) vulnerability identified in Lychee, a free and open-source photo-management software. The vulnerability exists in the SSRF protection mechanism implemented in the file `PhotoUrlRule.php`. Specifically, the IP validation check (lines 86-89) only activates when the hostname is an IP address. When a domain name is provided, the function `filter_var($host, FILTER_VALIDATE_IP)` returns false, causing the IP validation logic to be skipped entirely. This allows attackers to exploit DNS rebinding techniques to bypass SSRF protections. DNS rebinding involves manipulating DNS responses so that a domain name resolves to different IP addresses, including internal network addresses, enabling attackers to coerce the server into making unauthorized requests to internal services or other restricted resources. The vulnerability affects all Lychee versions prior to 7.5.2, which includes the vulnerable SSRF protection code. The issue was published on March 26, 2026, and has a CVSS 4.0 base score of 2.3, reflecting a low severity due to the need for low privileges and partial attack complexity. No public exploits are known to exist at this time. The vulnerability is classified under CWE-918 (Server-Side Request Forgery). The patch in version 7.5.2 addresses this by correcting the validation logic to properly handle domain names and prevent bypass via DNS rebinding.
Potential Impact
The primary impact of this SSRF vulnerability is that an attacker with low privileges on a vulnerable Lychee installation can coerce the server to send unauthorized HTTP requests to arbitrary internal or external systems. This can lead to information disclosure if internal services respond with sensitive data, or enable further attacks such as port scanning, accessing metadata services in cloud environments, or interacting with internal APIs not exposed externally. However, the overall impact is limited by the low CVSS score, indicating that exploitation requires some level of access (likely authenticated user or low privilege) and that the vulnerability does not directly lead to remote code execution or full system compromise. Organizations running Lychee in environments with sensitive internal networks or cloud metadata services are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack chain but is unlikely to cause immediate critical damage on its own.
Mitigation Recommendations
The primary mitigation is to upgrade Lychee to version 7.5.2 or later, where the SSRF protection logic has been corrected to properly validate domain names and prevent DNS rebinding bypass. Until upgrading is possible, organizations should implement network-level controls such as restricting outbound HTTP requests from the Lychee server to only trusted destinations, using firewall rules or proxy whitelisting. Additionally, internal services that could be targeted by SSRF should enforce strong authentication and authorization to limit the impact of unauthorized requests. Monitoring and logging outbound requests from Lychee can help detect suspicious activity indicative of SSRF exploitation attempts. Developers and administrators should also review any custom plugins or integrations that might bypass standard request validation. Finally, educating users about the risks of SSRF and applying the principle of least privilege to Lychee user accounts can reduce the attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T15:23:42.216Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c6c6933c064ed76fdc299b
Added to database: 3/27/2026, 6:04:03 PM
Last enriched: 3/27/2026, 6:07:56 PM
Last updated: 3/27/2026, 11:35:45 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.