Impact
The vulnerability originates from an incomplete patch that left three SSRF vectors unprotected within Wallos. An authenticated user can supply a crafted URL to the AI Ollama host parameter, the AI recommendations endpoint, or the notification cron job, enabling them to force the server to resolve and contact arbitrary internal or cloud metadata services. This can expose sensitive environment data such as instance metadata, credentials or internal service traffic, compromising confidentiality and potentially facilitating lateral movement. The bug aligns with the standard SSRF weakness identified by CWE‑918.
Affected Systems
Wallos, an open‑source subscription tracker developed by ellite, is affected. Versions of the application prior to 4.7.0 are vulnerable because the SSRF guard was not applied to the three mentioned endpoints. The product is listed under the wallosapp:wallos CPE string. Any deployment of Wallos before the 4.7.0 release, especially when exposed to authenticated users, falls into risk.
Risk and Exploitability
The assessed CVSS score is 7.1, indicating a high severity impact, while the EPSS score of less than 1% and absence from the CISA KEV list suggest a lower current exploit probability. Nevertheless, because the flaw allows direct internal network access from an authenticated context, organizations should treat it as a moderate to high risk. Once the firmware is updated, the risk is mitigated; before that, limiting the scope of authenticated access or blocking the vulnerable endpoints will reduce exposure.
OpenCVE Enrichment