SSRF Vulnerability in Wallos Personal Subscription Tracker by Elilte
CVE-2026-41687
What is CVE-2026-41687?
Wallos, an open-source personal subscription tracker developed by Elilte, prior to version 4.8.1, contains a security flaw that affects its Server-Side Request Forgery (SSRF) protection mechanisms. Specifically, the validation for IP addresses in certain endpoints is insufficient as it fails to block Carrier-Grade NAT (CGNAT) addresses defined under RFC 6598. While the system does include a mechanism to identify CGNAT addresses in its notification endpoints, the subscription and payment endpoints utilize inline validation which overlooks this crucial range. This oversight enables authenticated users to exploit the application by launching Blind SSRF attacks against internal services, posing a significant threat to security in environments utilizing CGNAT configurations. To mitigate this vulnerability, users are strongly encouraged to update to Wallos version 4.8.1, where the issue has been addressed.
Affected Version(s)
Wallos < 4.8.1
