CVE-2026-30841
EUVD-2026-1012107.03.2026, 06:16
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, passwordreset.php outputs $_GET["token"] and $_GET["email"] directly into HTML input value attributes using <?= $token ?> and <?= $email ?> without calling htmlspecialchars(). This allows reflected XSS by breaking out of the attribute context. This issue has been patched in version 4.6.2.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| wallosapp | wallos | 𝑥 < 4.6.2 |
𝑥
= Vulnerable software versions