Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64725: CWE-286: Incorrect User Management in WeblateOrg weblate

0
Low
VulnerabilityCVE-2025-64725cvecve-2025-64725cwe-286
Published: Mon Dec 15 2025 (12/15/2025, 20:21:06 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

CVE-2025-64725 is a low-severity vulnerability in Weblate versions prior to 5. 15 that allows a user to accept an invitation intended for a different user due to incorrect user management (CWE-286). This flaw can lead to unauthorized acceptance of invitations if a session with an invitation is left unattended. The vulnerability requires local access with low privileges, user interaction, and has a high attack complexity, limiting its exploitability. No known exploits are currently in the wild, and a patch is available in version 5. 15. European organizations using Weblate should update promptly and avoid leaving invitation sessions unattended to mitigate risk. The impact is limited mainly to confidentiality and integrity of invitation acceptance, with no direct availability impact. Countries with significant open source development and localization activities, such as Germany, France, and the UK, are more likely to be affected due to higher Weblate usage. Overall, the threat is low but warrants attention in environments where Weblate is used for collaborative translation projects.

AI-Powered Analysis

AILast updated: 12/22/2025, 21:55:21 UTC

Technical Analysis

CVE-2025-64725 is a vulnerability identified in Weblate, a popular web-based localization tool used for managing translation projects. The issue arises from incorrect user management (CWE-286) in versions prior to 5.15, where it is possible for a user to accept an invitation that was opened by a different user. This occurs because the application does not properly bind invitation acceptance to the intended user session, allowing a session with an invitation left open unattended to be exploited by another user with access to that session. The vulnerability requires the attacker to have low privileges on the system and to perform user interaction, such as clicking on an invitation link. The attack complexity is high, meaning it is not straightforward to exploit without specific conditions. The CVSS 4.0 score is 1.0, reflecting the low severity due to limited impact and exploitation difficulty. The vulnerability primarily affects confidentiality and integrity by potentially allowing unauthorized acceptance of invitations, which could lead to unauthorized access or actions within the localization project. There is no impact on availability. The vendor has released a patch in version 5.15 that addresses this issue by properly managing user sessions and invitation acceptance. As a workaround, users are advised not to leave Weblate sessions with invitations open unattended to prevent unauthorized acceptance. No known exploits have been reported in the wild, indicating limited active threat at this time.

Potential Impact

For European organizations using Weblate for localization and translation management, this vulnerability could lead to unauthorized acceptance of project invitations if sessions are left unattended. This may result in unauthorized users gaining access to translation projects or sensitive localization data, potentially compromising confidentiality and integrity of the translation workflow. Although the impact is limited and exploitation requires specific conditions, organizations with collaborative translation environments could face risks of unauthorized modifications or access. The vulnerability does not affect system availability, so operational disruption is unlikely. However, in regulated industries or where translation data is sensitive (e.g., legal, financial, or governmental sectors), even limited unauthorized access could have compliance or reputational consequences. Given the low severity and absence of known exploits, the immediate risk is low but should not be ignored, especially in environments with shared workstations or where multiple users access Weblate sessions on the same device.

Mitigation Recommendations

1. Upgrade Weblate installations to version 5.15 or later, where the vulnerability is patched. 2. Implement strict session management policies to ensure users log out or close invitation links promptly, avoiding unattended sessions with open invitations. 3. Educate users about the risk of leaving invitation links open in shared or public environments. 4. Enforce access controls on devices used to access Weblate to prevent unauthorized physical or remote access. 5. Monitor Weblate logs for unusual invitation acceptance patterns or access from unexpected users. 6. Consider implementing multi-factor authentication (MFA) for Weblate access to reduce risk of session hijacking or unauthorized use. 7. Regularly review user permissions and invitations to ensure only authorized users have access to projects. 8. If possible, isolate Weblate access to trusted networks or VPNs to reduce exposure. These measures go beyond generic advice by focusing on session hygiene, user education, and access control tailored to the nature of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.923Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69406fd9d9bcdf3f3d0056ae

Added to database: 12/15/2025, 8:30:17 PM

Last enriched: 12/22/2025, 9:55:21 PM

Last updated: 2/3/2026, 2:12:24 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats