CVE-2026-33212

Weblate is a web based localization tool. In versions prior to 5.17, the tasks API didn't verify user access for pending tasks. This could expose logs of in-progress operations to users who don't have access to given scope. The attacker needs to brute-force the random UUID of the task, so exploiting this is unlikely with the default API rate limits. This issue has been fixed in version 5.17.
Configurations

Configuration 1 (hide)

cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:*

History

21 Apr 2026, 14:11

Type Values Removed Values Added
CPE cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:*
First Time Weblate
Weblate weblate
References () https://github.com/WeblateOrg/weblate/commit/4e06b12cd05d087db68384e09d5f70fe883f2b70 - () https://github.com/WeblateOrg/weblate/commit/4e06b12cd05d087db68384e09d5f70fe883f2b70 - Patch
References () https://github.com/WeblateOrg/weblate/security/advisories/GHSA-vj45-x3pj-f4w4 - () https://github.com/WeblateOrg/weblate/security/advisories/GHSA-vj45-x3pj-f4w4 - Mitigation, Patch, Vendor Advisory

15 Apr 2026, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 18:17

Updated : 2026-04-21 14:11


NVD link : CVE-2026-33212

Mitre link : CVE-2026-33212

CVE.ORG link : CVE-2026-33212


JSON object : View

Products Affected

weblate

  • weblate
CWE
CWE-284

Improper Access Control