CVE-2026-41689 PUBLISHED

Wallos: Shared local webhook allowlist lets low-privilege users send arbitrary requests to allowlisted internal services

Assigner: GitHub_M
Reserved: 22.04.2026 Published: 07.05.2026 Updated: 07.05.2026

Wallos is an open-source, self-hostable personal subscription tracker. In versions 4.8.4 and prior, the webhook notification feature reuses an administrator-configured local-target allowlist for every logged-in user. Any normal user can fully control a webhook URL, headers, and body, then use Wallos to send server-side requests to allowlisted internal automation services. When such a target exposes deployment or execution APIs, this can further enable adjacent-service RCE, but that downstream result is conditional on the target service. At time of publication, there are no publicly available patches.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
CVSS Score: 6

Product Status

Vendor ellite
Product Wallos
Versions
  • Version <= 4.8.4 is affected

References

Problem Types

  • CWE-863: Incorrect Authorization CWE
  • CWE-918: Server-Side Request Forgery (SSRF) CWE