Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21889: CWE-284: Improper Access Control in WeblateOrg weblate

0
Low
VulnerabilityCVE-2026-21889cvecve-2026-21889cwe-284
Published: Wed Jan 14 2026 (01/14/2026, 16:28:30 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

CVE-2026-21889 is an improper access control vulnerability in Weblate versions prior to 5. 15. 2, where screenshot images were served directly by the HTTP server without adequate access restrictions. This flaw allows unauthenticated users to access screenshots by guessing their filenames, potentially exposing sensitive localization data. The vulnerability has a low CVSS score of 2. 3 due to the difficulty of exploitation and limited impact. It does not require authentication or user interaction but has high attack complexity and limited confidentiality impact. The issue is fixed in Weblate version 5. 15. 2.

AI-Powered Analysis

AILast updated: 01/14/2026, 17:03:02 UTC

Technical Analysis

CVE-2026-21889 identifies an improper access control vulnerability (CWE-284) in Weblate, a web-based localization platform widely used for managing software translation projects. Prior to version 5.15.2, Weblate served screenshot images directly through its HTTP server without enforcing proper access controls. This design flaw means that an unauthenticated attacker could potentially retrieve screenshot images by guessing or enumerating their filenames, as no authentication or authorization checks were applied to these resources. Screenshots often contain user interface elements or localized content that may reveal sensitive project information or internal development details. The vulnerability does not require user interaction or authentication, but the attack complexity is high because the attacker must guess valid filenames, which may be non-trivial depending on the naming scheme. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low confidentiality impact (VC:L). There are no known exploits in the wild, and the issue was addressed by implementing proper access control mechanisms in Weblate version 5.15.2. This fix ensures that screenshot images are no longer accessible without appropriate permissions, mitigating the risk of unauthorized data disclosure.

Potential Impact

For European organizations using Weblate versions prior to 5.15.2, this vulnerability could lead to unauthorized disclosure of screenshot images related to localization projects. While the confidentiality impact is low, the exposure of screenshots might reveal internal UI designs, translation progress, or sensitive project details that could aid further reconnaissance or social engineering attacks. The integrity and availability of systems are not affected. The low severity and high attack complexity reduce the likelihood of widespread exploitation, but organizations with strict data privacy requirements or sensitive localization content may face compliance or reputational risks if screenshots are exposed. Since Weblate is popular among open source communities and enterprises managing multilingual software, the impact is more pronounced in sectors relying heavily on software localization and development transparency.

Mitigation Recommendations

European organizations should immediately upgrade Weblate installations to version 5.15.2 or later to ensure the vulnerability is patched. If upgrading is not immediately feasible, administrators should restrict HTTP access to the directory or endpoint serving screenshot images using web server configuration (e.g., access control lists, IP whitelisting, or authentication requirements). Implementing strong filename randomization or obfuscation can reduce the risk of successful filename guessing. Regularly audit web server logs for suspicious access attempts to screenshot resources. Additionally, organizations should review their localization project data to assess the sensitivity of exposed screenshots and consider removing or redacting sensitive images. Incorporating access control policies and secure coding practices in localization tools will help prevent similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T17:24:36.929Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6967c8edd0ff220b95d99078

Added to database: 1/14/2026, 4:48:45 PM

Last enriched: 1/14/2026, 5:03:02 PM

Last updated: 1/14/2026, 7:02:04 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats