No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lycheeorg
Lycheeorg lychee |
|
| Vendors & Products |
Lycheeorg
Lycheeorg lychee |
Thu, 26 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lychee is a free, open-source photo-management tool. The patch introduced for GHSA-cpgw-wgf3-xc6v (SSRF via `Photo::fromUrl`) contains an incomplete IP validation check that fails to block loopback addresses and link-local addresses. Prior to version 7.5.1, an authenticated user can still reach internal services using direct IP addresses, bypassing all four protection configuration settings even when they are set to their secure defaults. Version 7.5.1 contains a fix for the issue. | |
| Title | Lychee has SSRF bypass via incomplete IP validation in Photo::fromUrl — loopback and link-local IPs not blocked | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T19:46:28.419Z
Reserved: 2026-03-20T18:05:11.831Z
Link: CVE-2026-33537
No data.
Status : Analyzed
Published: 2026-03-26T21:17:05.703
Modified: 2026-04-01T18:56:40.970
Link: CVE-2026-33537
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:25:16Z