CVE-2026-33220

Weblate is a web based localization tool. In versions prior to 5.17, the translation memory API exposed unintended endpoints, which in turn didn't perform proper access control. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable this feature as the CDN add-on is not enabled by default.
Configurations

Configuration 1 (hide)

cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:*

History

21 Apr 2026, 14:10

Type Values Removed Values Added
First Time Weblate
Weblate weblate
References () https://github.com/WeblateOrg/weblate/pull/18516 - () https://github.com/WeblateOrg/weblate/pull/18516 - Issue Tracking, Patch
References () https://github.com/WeblateOrg/weblate/security/advisories/GHSA-mqph-7h49-hqfm - () https://github.com/WeblateOrg/weblate/security/advisories/GHSA-mqph-7h49-hqfm - Third Party Advisory
CPE cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:*

15 Apr 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 19:16

Updated : 2026-04-21 14:10


NVD link : CVE-2026-33220

Mitre link : CVE-2026-33220

CVE.ORG link : CVE-2026-33220


JSON object : View

Products Affected

weblate

  • weblate
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor