Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64326: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in WeblateOrg weblate

0
Low
VulnerabilityCVE-2025-64326cvecve-2025-64326cwe-212
Published: Thu Nov 06 2025 (11/06/2025, 20:55:17 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

Weblate is a web based localization tool. In versions 5.14 and below, Weblate leaks the IP address of the project member inviting the user to the project in the audit log. The audit log includes IP addresses from admin-triggered actions, which can be viewed by invited users. This issue is fixed in version 5.14.1.

AI-Powered Analysis

AILast updated: 11/06/2025, 21:14:46 UTC

Technical Analysis

CVE-2025-64326 is a vulnerability classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer) affecting Weblate, a web-based localization tool widely used for software translation management. In versions 5.14 and earlier, the audit logs generated by Weblate include IP addresses associated with project members who invite new users to projects. These audit logs are accessible to invited users, meaning that users who receive an invitation can view the IP address of the inviter. This exposure of IP addresses constitutes a leakage of sensitive information, potentially compromising user privacy and enabling further reconnaissance by malicious actors. The vulnerability does not allow attackers to alter data or disrupt service but impacts confidentiality by revealing network information that should be protected. Exploitation requires that the attacker be invited to the project (user interaction) and have at least low privileges to access audit logs. The attack complexity is high due to the need for invitation and access. The issue was addressed and fixed in Weblate version 5.14.1, where IP addresses are no longer included in audit logs accessible to invited users. There are no known exploits in the wild, and the CVSS v3.1 base score is 2.6, reflecting a low severity. The vulnerability highlights the importance of sanitizing sensitive information before logging or sharing it with users who do not require such data.

Potential Impact

For European organizations using Weblate versions prior to 5.14.1, this vulnerability could lead to unintended disclosure of IP addresses of project members, including administrators or other privileged users. While the direct impact on system integrity or availability is negligible, the confidentiality breach could facilitate targeted reconnaissance or social engineering attacks by revealing network information. Organizations involved in software localization, particularly those managing sensitive or proprietary projects, may face privacy compliance risks under regulations like GDPR if IP addresses are considered personal data. The exposure could also undermine trust among collaborators if sensitive information is leaked to unintended parties. However, since exploitation requires user invitation and interaction, the scope of impact is limited to invited users and their potential misuse of the information. Overall, the impact is primarily a privacy concern with limited operational consequences but should not be ignored in environments with strict data protection requirements.

Mitigation Recommendations

The primary mitigation is to upgrade Weblate installations to version 5.14.1 or later, where the vulnerability is fixed by removing IP addresses from audit logs accessible to invited users. Until upgrading is possible, organizations should restrict audit log access strictly to trusted users and avoid inviting untrusted or external users to projects with sensitive audit logs. Additionally, review and adjust Weblate’s audit log permissions and visibility settings to minimize exposure of sensitive information. Implement network segmentation and monitoring to detect unusual access patterns that might indicate reconnaissance attempts. Educate project administrators and users about the risks of sharing audit log information and encourage minimal sharing of invitations. Finally, ensure compliance with data protection policies by treating IP addresses as sensitive personal data and applying appropriate controls to their storage and dissemination.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.028Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d0c0d08e329e0f8ef65ba

Added to database: 11/6/2025, 8:58:53 PM

Last enriched: 11/6/2025, 9:14:46 PM

Last updated: 11/7/2025, 8:06:22 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats