Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.2, password reset tokens in Wallos never expire. The password_resets table includes a created_at timestamp column, but the token validation logic never checks it. A password reset token remains valid indefinitely until it is used, allowing an attacker who intercepts a reset link at any point to use it days, weeks, or months later. This issue has been patched in version 4.7.2.
References
| Link | Resource |
|---|---|
| https://github.com/ellite/Wallos/commit/90bb6186ee4091590b6efdef824c85f2494ff2bb | Patch |
| https://github.com/ellite/Wallos/security/advisories/GHSA-p3fv-m43r-3fhf | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 19:16
Updated : 2026-03-26 20:59
NVD link : CVE-2026-33417
Mitre link : CVE-2026-33417
CVE.ORG link : CVE-2026-33417
JSON object : View
Products Affected
wallosapp
- wallos
CWE
CWE-613
Insufficient Session Expiration
