Description

Wallos is an open-source, self-hostable personal subscription tracker. In versions 4.8.4 and prior, the webhook notification feature reuses an administrator-configured local-target allowlist for every logged-in user. Any normal user can fully control a webhook URL, headers, and body, then use Wallos to send server-side requests to allowlisted internal automation services. When such a target exposes deployment or execution APIs, this can further enable adjacent-service RCE, but that downstream result is conditional on the target service. At time of publication, there are no publicly available patches.

INFO

Published Date :

2026-05-07T13:53:12.952Z

Last Modified :

2026-05-07T14:43:47.455Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-41689 vulnerability.

Vendors Products
Ellite
  • Wallos
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-41689.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact