Vulnerability Description
Lychee is a free, open-source photo-management tool. Prior to version 7.5.3, the photo `description` field is stored without HTML sanitization and rendered using `{!! $item->summary !!}` (Blade unescaped output) in the RSS, Atom, and JSON feed templates. The `/feed` endpoint is publicly accessible without authentication, allowing any RSS reader to execute attacker-controlled JavaScript. Version 7.5.3 fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lycheeorg | Lychee | < 7.5.3 |
Related Weaknesses (CWE)
References
- https://github.com/LycheeOrg/Lychee/commit/d2e2606a0223d5a384d5b806db1b31eb587adPatch
- https://github.com/LycheeOrg/Lychee/pull/4218Issue Tracking
- https://github.com/LycheeOrg/Lychee/releases/tag/v7.5.3Release Notes
- https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-5574-7f3r-hm9jExploitVendor Advisory
- https://github.com/LycheeOrg/Lychee/security/advisories/GHSA-5574-7f3r-hm9jExploitVendor Advisory
FAQ
What is CVE-2026-33738?
CVE-2026-33738 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Lychee is a free, open-source photo-management tool. Prior to version 7.5.3, the photo `description` field is stored without HTML sanitization and rendered using `{!! $item->summary !!}` (Blade unesca...
How severe is CVE-2026-33738?
CVE-2026-33738 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33738?
Check the references section above for vendor advisories and patch information. Affected products include: Lycheeorg Lychee.