Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, Wallos endpoints/logos/search.php accepts HTTP_PROXY and HTTPS_PROXY environment variables without validation, enabling SSRF via proxy hijacking. The server performs DNS resolution on user-supplied search terms, which can be controlled by attackers to trigger outbound requests to arbitrary domains. This issue has been patched in version 4.7.0.
Cite this page
CVE-2026-33407. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-33407
Use CWE-918, Wallosapp vendor hub and Wallos product page to widen CVE-2026-33407 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-55372, CVE-2026-30840 and CVE-2026-30828 for nearby disclosures in the same product family.