Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.2, password reset tokens in Wallos never expire. The password_resets table includes a created_at timestamp column, but the token validation logic never checks it. A password reset token remains valid indefinitely until it is used, allowing an attacker who intercepts a reset link at any point to use it days, weeks, or months later. This issue has been patched in version 4.7.2.
Cite this page
CVE-2026-33417. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-33417
Use CWE-613, Wallosapp vendor hub and Wallos product page to widen CVE-2026-33417 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-55372, CVE-2026-30840 and CVE-2026-30828 for nearby disclosures in the same product family.