Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64725: CWE-286: Incorrect User Management in WeblateOrg weblate

0
Low
VulnerabilityCVE-2025-64725cvecve-2025-64725cwe-286
Published: Mon Dec 15 2025 (12/15/2025, 20:21:06 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.

AI-Powered Analysis

AILast updated: 12/15/2025, 20:45:34 UTC

Technical Analysis

CVE-2025-64725 is a vulnerability identified in the Weblate localization platform, specifically affecting versions prior to 5.15. The issue is categorized under CWE-286, which relates to incorrect user management and access control. The vulnerability allows an attacker or another user to accept an invitation that was originally sent to a different user. This occurs because the system does not properly verify the identity of the user accepting the invitation, leading to potential unauthorized acceptance. The flaw requires that the invitation page be left open in a session unattended by the legitimate user, and the attacker must have local access to the session or device. The CVSS 4.0 score is 1.0, reflecting low severity due to the requirement for local access, user interaction, and the limited scope of impact on confidentiality, integrity, and availability. The vulnerability does not allow privilege escalation or direct data compromise but could lead to unauthorized account linkage or access within the Weblate platform. The issue was patched in Weblate version 5.15, and users are advised to upgrade. As a temporary workaround, users should avoid leaving invitation pages open in unattended sessions to prevent exploitation.

Potential Impact

For European organizations using Weblate for localization management, this vulnerability poses a limited but tangible risk. Unauthorized acceptance of invitations could lead to unauthorized users gaining access to translation projects or sensitive localization data, potentially impacting confidentiality and integrity of localized content. While the direct impact is low, in environments where localization data is sensitive or tied to intellectual property, this could have reputational or operational consequences. The requirement for local access and user interaction reduces the likelihood of widespread exploitation, but insider threats or compromised workstations could leverage this vulnerability. Organizations with shared workstations or remote desktop environments are at higher risk if sessions are left unattended. The impact on availability is negligible. Overall, the vulnerability could facilitate unauthorized collaboration or data exposure within the Weblate platform, which may affect compliance with data protection regulations if sensitive data is involved.

Mitigation Recommendations

The primary mitigation is to upgrade Weblate installations to version 5.15 or later, where the vulnerability is patched. Until the upgrade can be performed, organizations should implement strict session management policies, including educating users not to leave invitation pages open in unattended sessions. Enforce automatic session timeouts and screen locking on devices used to access Weblate to prevent unauthorized local access. Additionally, restrict physical and remote access to workstations where Weblate is accessed, and monitor user activity for unusual acceptance of invitations. Consider implementing multi-factor authentication (MFA) for Weblate accounts to add an additional layer of security. Regularly audit user invitations and access logs to detect any unauthorized acceptance events. Finally, integrate Weblate access within broader identity and access management (IAM) frameworks to ensure consistent user verification.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.923Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69406fd9d9bcdf3f3d0056ae

Added to database: 12/15/2025, 8:30:17 PM

Last enriched: 12/15/2025, 8:45:34 PM

Last updated: 12/16/2025, 3:51:05 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats