CVE-2026-30841 PUBLISHED

Wallos: Reflected XSS via unescaped token and email parameters in passwordreset.php

Assigner: GitHub_M
Reserved: 05.03.2026 Published: 07.03.2026 Updated: 07.03.2026

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, passwordreset.php outputs $_GET["token"] and $_GET["email"] directly into HTML input value attributes using and without calling htmlspecialchars(). This allows reflected XSS by breaking out of the attribute context. This issue has been patched in version 4.6.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor ellite
Product Wallos
Versions
  • Version < 4.6.2 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE