CVE-2026-33417

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.2, password reset tokens in Wallos never expire. The password_resets table includes a created_at timestamp column, but the token validation logic never checks it. A password reset token remains valid indefinitely until it is used, allowing an attacker who intercepts a reset link at any point to use it days, weeks, or months later. This issue has been patched in version 4.7.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-24 19:16

Updated : 2026-03-26 20:59


NVD link : CVE-2026-33417

Mitre link : CVE-2026-33417

CVE.ORG link : CVE-2026-33417


JSON object : View

Products Affected

wallosapp

  • wallos
CWE
CWE-613

Insufficient Session Expiration