Skip to main content

CVE-2025-49134: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in WeblateOrg weblate

Low
VulnerabilityCVE-2025-49134cvecve-2025-49134cwe-359
Published: Mon Jun 16 2025 (06/16/2025, 21:03:31 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

Weblate is a web based localization tool. Prior to version 5.12, the audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters. This issue has been patched in version 5.12.

AI-Powered Analysis

AILast updated: 06/16/2025, 21:34:31 UTC

Technical Analysis

CVE-2025-49134 is a low-severity vulnerability affecting Weblate, a web-based localization tool widely used for collaborative translation and localization projects. The vulnerability arises from the exposure of private personal information, specifically the full IP address of users, in audit log notifications prior to version 5.12. These audit log notifications, which are intended to track user actions within the platform, included the full IP address of the acting user. When these notifications are sent via email, third-party servers such as SMTP relays or spam filters can intercept and access this IP address information. This exposure constitutes a privacy risk as IP addresses can be used to infer user location, track user activity, or potentially correlate identities across different services. The vulnerability is classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor). The issue was patched in Weblate version 5.12, which removed or obfuscated the IP address information in audit log notifications. The CVSS 4.0 score is 2.1, reflecting a low severity due to the limited impact on confidentiality and no impact on integrity or availability. Exploitation does not require user interaction but does require high privileges (PR:H) within the system to trigger the audit log notifications containing the IP addresses. The attack vector is network-based (AV:N), but the complexity is high (AC:H), and no authentication or user interaction is needed beyond the privilege requirement. There are no known exploits in the wild at this time. Overall, this vulnerability primarily impacts user privacy rather than system security or functionality.

Potential Impact

For European organizations using Weblate versions prior to 5.12, this vulnerability poses a privacy risk by potentially exposing user IP addresses through audit log notifications sent via email. This could lead to unauthorized actors, such as malicious SMTP relay operators or spam filter providers, gaining access to sensitive user metadata. The exposure of IP addresses can facilitate user tracking, profiling, or targeted attacks such as spear phishing or social engineering. While the vulnerability does not directly compromise system integrity or availability, it undermines compliance with European data protection regulations such as the GDPR, which mandates strict controls over personal data processing and transmission. Organizations with strict privacy requirements or those handling sensitive localization projects may face reputational damage or regulatory scrutiny if this vulnerability is exploited. However, the impact is limited by the requirement that the attacker must have high privileges within the Weblate system to generate the audit logs containing IP addresses, reducing the likelihood of widespread exploitation. Additionally, the vulnerability does not affect the core functionality or security of the Weblate platform beyond privacy concerns.

Mitigation Recommendations

1. Upgrade Weblate installations to version 5.12 or later immediately to ensure the patch removing IP address exposure in audit log notifications is applied. 2. Review and restrict access controls within Weblate to minimize the number of users with high privileges capable of generating audit logs containing sensitive information. 3. Configure email systems to use end-to-end encryption (e.g., S/MIME or PGP) for audit log notifications to prevent interception by third-party SMTP relays or spam filters. 4. Implement strict monitoring and logging of privileged user actions within Weblate to detect any unauthorized attempts to generate or access audit logs. 5. Where possible, disable or customize audit log notifications to exclude sensitive information such as IP addresses if upgrading is delayed. 6. Conduct privacy impact assessments to ensure compliance with GDPR and other relevant data protection laws, documenting the mitigation steps taken. 7. Educate administrators and privileged users about the risks of exposing IP addresses and the importance of applying patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-02T10:39:41.633Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68508a5da8c921274384ab40

Added to database: 6/16/2025, 9:19:25 PM

Last enriched: 6/16/2025, 9:34:31 PM

Last updated: 7/30/2025, 4:17:54 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats