CVE-2025-64725: CWE-286: Incorrect User Management in WeblateOrg weblate
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.
AI Analysis
Technical Summary
CVE-2025-64725 is a vulnerability identified in the Weblate localization platform, specifically affecting versions prior to 5.15. The issue is categorized under CWE-286, which relates to incorrect user management and access control. The vulnerability allows an attacker or another user to accept an invitation that was originally sent to a different user. This occurs because the system does not properly verify the identity of the user accepting the invitation, leading to potential unauthorized acceptance. The flaw requires that the invitation page be left open in a session unattended by the legitimate user, and the attacker must have local access to the session or device. The CVSS 4.0 score is 1.0, reflecting low severity due to the requirement for local access, user interaction, and the limited scope of impact on confidentiality, integrity, and availability. The vulnerability does not allow privilege escalation or direct data compromise but could lead to unauthorized account linkage or access within the Weblate platform. The issue was patched in Weblate version 5.15, and users are advised to upgrade. As a temporary workaround, users should avoid leaving invitation pages open in unattended sessions to prevent exploitation.
Potential Impact
For European organizations using Weblate for localization management, this vulnerability poses a limited but tangible risk. Unauthorized acceptance of invitations could lead to unauthorized users gaining access to translation projects or sensitive localization data, potentially impacting confidentiality and integrity of localized content. While the direct impact is low, in environments where localization data is sensitive or tied to intellectual property, this could have reputational or operational consequences. The requirement for local access and user interaction reduces the likelihood of widespread exploitation, but insider threats or compromised workstations could leverage this vulnerability. Organizations with shared workstations or remote desktop environments are at higher risk if sessions are left unattended. The impact on availability is negligible. Overall, the vulnerability could facilitate unauthorized collaboration or data exposure within the Weblate platform, which may affect compliance with data protection regulations if sensitive data is involved.
Mitigation Recommendations
The primary mitigation is to upgrade Weblate installations to version 5.15 or later, where the vulnerability is patched. Until the upgrade can be performed, organizations should implement strict session management policies, including educating users not to leave invitation pages open in unattended sessions. Enforce automatic session timeouts and screen locking on devices used to access Weblate to prevent unauthorized local access. Additionally, restrict physical and remote access to workstations where Weblate is accessed, and monitor user activity for unusual acceptance of invitations. Consider implementing multi-factor authentication (MFA) for Weblate accounts to add an additional layer of security. Regularly audit user invitations and access logs to detect any unauthorized acceptance events. Finally, integrate Weblate access within broader identity and access management (IAM) frameworks to ensure consistent user verification.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2025-64725: CWE-286: Incorrect User Management in WeblateOrg weblate
Description
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.
AI-Powered Analysis
Technical Analysis
CVE-2025-64725 is a vulnerability identified in the Weblate localization platform, specifically affecting versions prior to 5.15. The issue is categorized under CWE-286, which relates to incorrect user management and access control. The vulnerability allows an attacker or another user to accept an invitation that was originally sent to a different user. This occurs because the system does not properly verify the identity of the user accepting the invitation, leading to potential unauthorized acceptance. The flaw requires that the invitation page be left open in a session unattended by the legitimate user, and the attacker must have local access to the session or device. The CVSS 4.0 score is 1.0, reflecting low severity due to the requirement for local access, user interaction, and the limited scope of impact on confidentiality, integrity, and availability. The vulnerability does not allow privilege escalation or direct data compromise but could lead to unauthorized account linkage or access within the Weblate platform. The issue was patched in Weblate version 5.15, and users are advised to upgrade. As a temporary workaround, users should avoid leaving invitation pages open in unattended sessions to prevent exploitation.
Potential Impact
For European organizations using Weblate for localization management, this vulnerability poses a limited but tangible risk. Unauthorized acceptance of invitations could lead to unauthorized users gaining access to translation projects or sensitive localization data, potentially impacting confidentiality and integrity of localized content. While the direct impact is low, in environments where localization data is sensitive or tied to intellectual property, this could have reputational or operational consequences. The requirement for local access and user interaction reduces the likelihood of widespread exploitation, but insider threats or compromised workstations could leverage this vulnerability. Organizations with shared workstations or remote desktop environments are at higher risk if sessions are left unattended. The impact on availability is negligible. Overall, the vulnerability could facilitate unauthorized collaboration or data exposure within the Weblate platform, which may affect compliance with data protection regulations if sensitive data is involved.
Mitigation Recommendations
The primary mitigation is to upgrade Weblate installations to version 5.15 or later, where the vulnerability is patched. Until the upgrade can be performed, organizations should implement strict session management policies, including educating users not to leave invitation pages open in unattended sessions. Enforce automatic session timeouts and screen locking on devices used to access Weblate to prevent unauthorized local access. Additionally, restrict physical and remote access to workstations where Weblate is accessed, and monitor user activity for unusual acceptance of invitations. Consider implementing multi-factor authentication (MFA) for Weblate accounts to add an additional layer of security. Regularly audit user invitations and access logs to detect any unauthorized acceptance events. Finally, integrate Weblate access within broader identity and access management (IAM) frameworks to ensure consistent user verification.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T14:07:42.923Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69406fd9d9bcdf3f3d0056ae
Added to database: 12/15/2025, 8:30:17 PM
Last enriched: 12/15/2025, 8:45:34 PM
Last updated: 12/16/2025, 3:51:05 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14749: Improper Access Controls in Ningyuanda TC155
MediumCVE-2025-14748: Improper Access Controls in Ningyuanda TC155
MediumCVE-2025-62849: CWE-89 in QNAP Systems Inc. QTS
MediumCVE-2025-62848: CWE-476 in QNAP Systems Inc. QTS
HighCVE-2025-62847: CWE-88 in QNAP Systems Inc. QTS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.