Weblate vulnerabilities
30 known vulnerabilities affecting weblate/weblate.
Total CVEs
30
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH6MEDIUM15LOW7
Vulnerabilities
Page 1 of 2
CVE-2026-34242HIGH≥ 0, < 5.172026-04-16
CVE-2026-34242 [HIGH] CWE-200 Weblate: Arbitrary File Read via Symlink
Weblate: Arbitrary File Read via Symlink
### Impact
The ZIP download feature didn't verify downloaded file and it could follow symlinks outside the repository.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18683
### References
Thanks to @DavidCarliez for reporting this vulnerability via GitHub.
ghsa
CVE-2026-33435HIGH≥ 0, < 5.172026-04-16
CVE-2026-33435 [HIGH] CWE-23 Weblate: Remote code execution during backup restoration
Weblate: Remote code execution during backup restoration
### Impact
The project backup didn't filter Git and Mercurial configuration files and this could lead to remote code execution under certain circumstances.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18549
### Workarounds
The project backup is only accessible to users who can create projects. Restricting access to this limits scope of the
ghsa
CVE-2026-34393HIGH≥ 0, < 5.172026-04-16
CVE-2026-34393 [HIGH] CWE-269 Weblate: Privilege escalation in the user API endpoint
Weblate: Privilege escalation in the user API endpoint
### Impact
The user patching API endpoint didn't properly limit the scope of edits.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18687
### References
Thanks to @tikket1 and @DavidCarliez for reporting this via GitHub. We received two individual reports for this.
ghsa
CVE-2026-40256MEDIUM≥ 0, < 5.172026-04-16
CVE-2026-40256 [MEDIUM] CWE-22 Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision
Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision
### Impact
Weblate repository-boundary validation relies on string prefix checks on resolved absolute paths. In multiple code paths, the check uses startswith against the repository root path. This is not path-segment aware and can be bypassed when the external path share
ghsa
CVE-2026-33440MEDIUM≥ 0, < 5.172026-04-16
CVE-2026-33440 [MEDIUM] CWE-918 Weblate: Authenticated SSRF via redirect bypass of ALLOWED_ASSET_DOMAINS in screenshot URL uploads
Weblate: Authenticated SSRF via redirect bypass of ALLOWED_ASSET_DOMAINS in screenshot URL uploads
### Impact
The ALLOWED_ASSET_DOMAINS setting applied only to the first issued requests and didn't restrict possible redirects.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18550
### References
This issue was reported by @spbavarva via GitHub.
ghsa
CVE-2026-39845MEDIUM≥ 0, < 5.172026-04-16
CVE-2026-39845 [MEDIUM] CWE-918 Weblate: SSRF via the webhook add-on using unprotected fetch_url()
Weblate: SSRF via the webhook add-on using unprotected fetch_url()
### Impact
The webhook add-on did not utilize existing SSRF protection.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18815
### Workarounds
Disabling the add-on would avoid misusing this.
### References
Thanks to @Lihfdgjr for reporting this via GitHub.
ghsa
CVE-2026-33214MEDIUM≥ 0, < 5.172026-04-16
CVE-2026-33214 [MEDIUM] CWE-862 Weblate: Improper access control for the translation memory in API
Weblate: Improper access control for the translation memory in API
### Impact
The translation memory API exposed unintended endpoints, which in turn didn't do proper access control.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18513
### Workarounds
Blocking access to `/api/memory/` in the HTTP server removes access to this feature.
### References
This issue was reported by [ggamno](
ghsa
CVE-2026-34244MEDIUM≥ 0, < 5.172026-04-16
CVE-2026-34244 [MEDIUM] CWE-200 Weblate: SSRF via Project-Level Machinery Configuration
Weblate: SSRF via Project-Level Machinery Configuration
### Impact
A user with the `project.edit` permission (granted by the per-project "Administration" role) can configure machine translation service URLs pointing to arbitrary internal network addresses. During configuration validation, Weblate makes an HTTP request to the attacker-controlled URL and reflects up to 200 characters of the response body back
ghsa
CVE-2026-33220MEDIUM≥ 0, < 5.172026-04-16
CVE-2026-33220 [MEDIUM] CWE-200 Weblate: JavaScript localization CDN add-on allows arbitrary local file read outside the repository
Weblate: JavaScript localization CDN add-on allows arbitrary local file read outside the repository
### Impact
The translation memory API exposed unintended endpoints, which in turn didn't do proper access control.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18516
### Workarounds
The CDN add-on is not enabled by default.
### References
Thanks to @sp
ghsa
CVE-2026-33212LOW≥ 0, < 5.172026-04-16
CVE-2026-33212 [LOW] CWE-284 Weblate: Improper access control for pending tasks in API
Weblate: Improper access control for pending tasks in API
### Impact
The API for tasks didn't verify user access for pending tasks. This could expose logs of in-progress operations to users who don't have access to given scope.
### Patches
* https://github.com/WeblateOrg/weblate/pull/18515
### Workarounds
The attacker needs to guess the random UUID of the task, so exploiting this is unlikely with the defaul
ghsa
CVE-2026-27457MEDIUMCVSS 4.3fixed in 5.16.12026-02-26
CVE-2026-27457 [MEDIUM] CWE-200 CVE-2026-27457: Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`w
Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve
ghsanvdosv
CVE-2026-24126CRITICALCVSS 9.1fixed in 5.162026-02-19
CVE-2026-24126 [CRITICAL] CWE-88 CVE-2026-24126: Weblate is a web based localization tool. Prior to 5.16.0, the SSH management console did not valida
Weblate is a web based localization tool. Prior to 5.16.0, the SSH management console did not validate the passed input while adding the SSH host key, which could lead to an argument injection to `ssh-add`. Version 5.16.0 fixes the issue. As a workaround, properly limit access to the management console.
ghsanvdosv
CVE-2026-21889LOWCVSS 2.3fixed in 5.15.22026-01-14
CVE-2026-21889 [LOW] CWE-284 CVE-2026-21889: Weblate is a web based localization tool. Prior to 5.15.2, the screenshot images were served directl
Weblate is a web based localization tool. Prior to 5.15.2, the screenshot images were served directly by the HTTP server without proper access control. This could allow an unauthenticated user to access screenshots after guessing their filename. This vulnerability is fixed in 5.15.2.
ghsanvdosv
CVE-2025-68398CRITICALCVSS 9.1fixed in 5.15.12025-12-18
CVE-2025-68398 [CRITICAL] CWE-20 CVE-2025-68398: Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite
Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite Git configuration remotely and override some of its behavior. Version 5.15.1 fixes the issue.
ghsanvdosv
CVE-2025-68279MEDIUMCVSS 6.5fixed in 5.15.12025-12-18
CVE-2025-68279 [MEDIUM] CWE-22 CVE-2025-68279: Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to read arbit
Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to read arbitrary files from the server file system using crafted symbolic links in the repository. Version 5.15.1 fixes the issue.
ghsanvdosv
CVE-2025-67715MEDIUMCVSS 4.3fixed in 5.152025-12-16
CVE-2025-67715 [MEDIUM] CWE-284 CVE-2025-67715: Weblate is a web based localization tool. In versions prior to 5.15, it was possible to retrieve use
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to retrieve user notification settings or list all users via API. Version 5.15 fixes the issue.
ghsanvdosv
CVE-2025-67492MEDIUMCVSS 5.3fixed in 5.152025-12-16
CVE-2025-67492 [MEDIUM] CWE-1286 CVE-2025-67492: Weblate is a web based localization tool. In versions prior to 5.15, it was possible to trigger repo
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to trigger repository updates for many repositories via a crafted webhook payload. Version 5.15 fixes the issue. As a workaround, disabling webhooks completely using ENABLE_HOOKS avoids this vulnerability.
ghsanvdosv
CVE-2025-66407MEDIUMCVSS 5.0fixed in 5.152025-12-16
CVE-2025-66407 [MEDIUM] CWE-352 CVE-2025-66407: Weblate is a web based localization tool. The Create Component functionality in Weblate allows autho
Weblate is a web based localization tool. The Create Component functionality in Weblate allows authorized users to add new translation components by specifying both a version control system and a source code repository URL to pull from. However, prior to version 5.15, the repository URL field is not validated or sanitized, allowing an attacker to su
nvd
CVE-2025-64725LOWCVSS 1.0fixed in 5.152025-12-15
CVE-2025-64725 [LOW] CWE-286 CVE-2025-64725: Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an in
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.
ghsanvdosv
CVE-2025-64326LOWCVSS 3.5fixed in 5.14.12025-11-06
CVE-2025-64326 [LOW] CWE-212 CVE-2025-64326: Weblate is a web based localization tool. In versions 5.14 and below, Weblate leaks the IP address
Weblate is a web based localization tool. In versions 5.14 and below, Weblate leaks the IP address of the project member inviting the user to the project in the audit log. The audit log includes IP addresses from admin-triggered actions, which can be viewed by invited users. This issue is fixed in version 5.14.1.
ghsanvdosv
1 / 2Next →