CVE-2026-30841

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, passwordreset.php outputs $_GET["token"] and $_GET["email"] directly into HTML input value attributes using <?= $token ?> and <?= $email ?> without calling htmlspecialchars(). This allows reflected XSS by breaking out of the attribute context. This issue has been patched in version 4.6.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-07 06:16

Updated : 2026-03-11 18:08


NVD link : CVE-2026-30841

Mitre link : CVE-2026-30841

CVE.ORG link : CVE-2026-30841


JSON object : View

Products Affected

wallosapp

  • wallos
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')