CVE-2025-64326: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in WeblateOrg weblate
Weblate is a web based localization tool. In versions 5.14 and below, Weblate leaks the IP address of the project member inviting the user to the project in the audit log. The audit log includes IP addresses from admin-triggered actions, which can be viewed by invited users. This issue is fixed in version 5.14.1.
AI Analysis
Technical Summary
CVE-2025-64326 is a vulnerability classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer) affecting Weblate, a web-based localization tool widely used for software translation management. In versions 5.14 and earlier, the audit logs generated by Weblate include IP addresses associated with project members who invite new users to projects. These audit logs are accessible to invited users, meaning that users who receive an invitation can view the IP address of the inviter. This exposure of IP addresses constitutes a leakage of sensitive information, potentially compromising user privacy and enabling further reconnaissance by malicious actors. The vulnerability does not allow attackers to alter data or disrupt service but impacts confidentiality by revealing network information that should be protected. Exploitation requires that the attacker be invited to the project (user interaction) and have at least low privileges to access audit logs. The attack complexity is high due to the need for invitation and access. The issue was addressed and fixed in Weblate version 5.14.1, where IP addresses are no longer included in audit logs accessible to invited users. There are no known exploits in the wild, and the CVSS v3.1 base score is 2.6, reflecting a low severity. The vulnerability highlights the importance of sanitizing sensitive information before logging or sharing it with users who do not require such data.
Potential Impact
For European organizations using Weblate versions prior to 5.14.1, this vulnerability could lead to unintended disclosure of IP addresses of project members, including administrators or other privileged users. While the direct impact on system integrity or availability is negligible, the confidentiality breach could facilitate targeted reconnaissance or social engineering attacks by revealing network information. Organizations involved in software localization, particularly those managing sensitive or proprietary projects, may face privacy compliance risks under regulations like GDPR if IP addresses are considered personal data. The exposure could also undermine trust among collaborators if sensitive information is leaked to unintended parties. However, since exploitation requires user invitation and interaction, the scope of impact is limited to invited users and their potential misuse of the information. Overall, the impact is primarily a privacy concern with limited operational consequences but should not be ignored in environments with strict data protection requirements.
Mitigation Recommendations
The primary mitigation is to upgrade Weblate installations to version 5.14.1 or later, where the vulnerability is fixed by removing IP addresses from audit logs accessible to invited users. Until upgrading is possible, organizations should restrict audit log access strictly to trusted users and avoid inviting untrusted or external users to projects with sensitive audit logs. Additionally, review and adjust Weblate’s audit log permissions and visibility settings to minimize exposure of sensitive information. Implement network segmentation and monitoring to detect unusual access patterns that might indicate reconnaissance attempts. Educate project administrators and users about the risks of sharing audit log information and encourage minimal sharing of invitations. Finally, ensure compliance with data protection policies by treating IP addresses as sensitive personal data and applying appropriate controls to their storage and dissemination.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-64326: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in WeblateOrg weblate
Description
Weblate is a web based localization tool. In versions 5.14 and below, Weblate leaks the IP address of the project member inviting the user to the project in the audit log. The audit log includes IP addresses from admin-triggered actions, which can be viewed by invited users. This issue is fixed in version 5.14.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-64326 is a vulnerability classified under CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer) affecting Weblate, a web-based localization tool widely used for software translation management. In versions 5.14 and earlier, the audit logs generated by Weblate include IP addresses associated with project members who invite new users to projects. These audit logs are accessible to invited users, meaning that users who receive an invitation can view the IP address of the inviter. This exposure of IP addresses constitutes a leakage of sensitive information, potentially compromising user privacy and enabling further reconnaissance by malicious actors. The vulnerability does not allow attackers to alter data or disrupt service but impacts confidentiality by revealing network information that should be protected. Exploitation requires that the attacker be invited to the project (user interaction) and have at least low privileges to access audit logs. The attack complexity is high due to the need for invitation and access. The issue was addressed and fixed in Weblate version 5.14.1, where IP addresses are no longer included in audit logs accessible to invited users. There are no known exploits in the wild, and the CVSS v3.1 base score is 2.6, reflecting a low severity. The vulnerability highlights the importance of sanitizing sensitive information before logging or sharing it with users who do not require such data.
Potential Impact
For European organizations using Weblate versions prior to 5.14.1, this vulnerability could lead to unintended disclosure of IP addresses of project members, including administrators or other privileged users. While the direct impact on system integrity or availability is negligible, the confidentiality breach could facilitate targeted reconnaissance or social engineering attacks by revealing network information. Organizations involved in software localization, particularly those managing sensitive or proprietary projects, may face privacy compliance risks under regulations like GDPR if IP addresses are considered personal data. The exposure could also undermine trust among collaborators if sensitive information is leaked to unintended parties. However, since exploitation requires user invitation and interaction, the scope of impact is limited to invited users and their potential misuse of the information. Overall, the impact is primarily a privacy concern with limited operational consequences but should not be ignored in environments with strict data protection requirements.
Mitigation Recommendations
The primary mitigation is to upgrade Weblate installations to version 5.14.1 or later, where the vulnerability is fixed by removing IP addresses from audit logs accessible to invited users. Until upgrading is possible, organizations should restrict audit log access strictly to trusted users and avoid inviting untrusted or external users to projects with sensitive audit logs. Additionally, review and adjust Weblate’s audit log permissions and visibility settings to minimize exposure of sensitive information. Implement network segmentation and monitoring to detect unusual access patterns that might indicate reconnaissance attempts. Educate project administrators and users about the risks of sharing audit log information and encourage minimal sharing of invitations. Finally, ensure compliance with data protection policies by treating IP addresses as sensitive personal data and applying appropriate controls to their storage and dissemination.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-30T17:40:52.028Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d0c0d08e329e0f8ef65ba
Added to database: 11/6/2025, 8:58:53 PM
Last enriched: 11/6/2025, 9:14:46 PM
Last updated: 11/7/2025, 8:06:22 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64346: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jaredallard archives
MediumCVE-2025-12527: CWE-862 Missing Authorization in yydevelopment Page & Post Notes
MediumCVE-2025-12520: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jgwhite33 WP Airbnb Review Slider
MediumCVE-2025-64343: CWE-289: Authentication Bypass by Alternate Name in conda constructor
HighCVE-2025-64339: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.