Vulnerability Description
Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the SSRF protection in `PhotoUrlRule.php` can be bypassed using DNS rebinding. The IP validation check (line 86-89) only activates when the hostname is an IP address. When a domain name is used, `filter_var($host, FILTER_VALIDATE_IP)` returns `false`, skipping the entire check. Version 7.5.2 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lycheeorg | Lychee | < 7.5.2 |
Related Weaknesses (CWE)
References
- https://github.com/LycheeOrg/Lychee/commit/28c5261fb9deab4f9420c8cc2f73a87425939Patch
- https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-5245-4p8c-jwffExploitVendor Advisory
FAQ
What is CVE-2026-33644?
CVE-2026-33644 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the SSRF protection in `PhotoUrlRule.php` can be bypassed using DNS rebinding. The IP validation check (line 86-89) only ac...
How severe is CVE-2026-33644?
CVE-2026-33644 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33644?
Check the references section above for vendor advisories and patch information. Affected products include: Lycheeorg Lychee.