Impact
The vulnerability allows authenticated users to cause the application to fetch URLs that resolve to 100.64.0.0/10 addresses. This range is used for Carrier‑Grade NAT and other internal networks, so the attacker can reach internal services by supplying a URL that resolves to such an address. The result is a blind SSRF that can expose sensitive internal endpoints. The weakness is a missing check for the CGNAT range and corresponds to CWE-918, "Server‑Side Request Forgery".
Affected Systems
All installations of Wallos before version 4.8.1 are affected, including the main application, subscription processing, and payment handling modules. The product is provided by Ellite and is used as a self‑hosted personal subscription tracker. Version 4.8.1 and later contain the fix.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate impact. The EPSS score is not available, but the lack of a public KEV listing suggests that exploitation is not widespread yet. The attack requires user authentication and the ability to submit subscription or payment data. An attacker can therefore trigger the SSRF through legitimate user actions, with the potential to reach internal services behind CGNAT addresses. The weaknesses in input validation (FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE) make the issue straightforward to exploit for an authenticated user, though the scope is limited to internal network resources.
OpenCVE Enrichment