Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.7
Wallos: Malicious files can be accessed through URL parameter
CVE-2026-30828
Summary
A flaw in the URL handling of Wallos prior to version 4.6.2 allows an attacker to access sensitive files on the system. This makes it possible for an attacker to steal confidential information or disrupt system functionality. Update to version 4.6.2 or later to fix the issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wallosapp | wallos | <= 4.6.2 | – |
Original title
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, the url parameter can be used to retrieve local system files. This issue has been patched in version 4...
Original description
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, the url parameter can be used to retrieve local system files. This issue has been patched in version 4.6.2.
nvd CVSS4.0
8.7
Vulnerability type
CWE-22
Path Traversal
CWE-29
CWE-918
Server-Side Request Forgery (SSRF)
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026