CVE-2026-33644

Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the SSRF protection in `PhotoUrlRule.php` can be bypassed using DNS rebinding. The IP validation check (line 86-89) only activates when the hostname is an IP address. When a domain name is used, `filter_var($host, FILTER_VALIDATE_IP)` returns `false`, skipping the entire check. Version 7.5.2 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*

History

30 Mar 2026, 18:10

Type Values Removed Values Added
First Time Lycheeorg
Lycheeorg lychee
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CPE cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*
References () https://github.com/LycheeOrg/Lychee/commit/28c5261fb9deab4f9420c8cc2f73a87425939107 - () https://github.com/LycheeOrg/Lychee/commit/28c5261fb9deab4f9420c8cc2f73a87425939107 - Patch
References () https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-5245-4p8c-jwff - () https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-5245-4p8c-jwff - Exploit, Vendor Advisory

Information

Published : 2026-03-26 21:17

Updated : 2026-03-30 18:10


NVD link : CVE-2026-33644

Mitre link : CVE-2026-33644

CVE.ORG link : CVE-2026-33644


JSON object : View

Products Affected

lycheeorg

  • lychee
CWE
CWE-918

Server-Side Request Forgery (SSRF)