Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22250: CWE-295: Improper Certificate Validation in WeblateOrg wlc

0
Low
VulnerabilityCVE-2026-22250cvecve-2026-22250cwe-295
Published: Mon Jan 12 2026 (01/12/2026, 17:52:01 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: wlc

Description

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, the SSL verification would be skipped for some crafted URLs. This vulnerability is fixed in 1.17.0.

AI-Powered Analysis

AILast updated: 01/12/2026, 18:23:19 UTC

Technical Analysis

CVE-2026-22250 identifies an improper certificate validation vulnerability (CWE-295) in the Weblate command-line client (wlc) versions prior to 1.17.0. Weblate is an open-source platform widely used for software localization, and wlc interacts with Weblate's REST API to facilitate translation management. The vulnerability arises because wlc skips SSL certificate verification for some specifically crafted URLs, undermining the TLS security guarantees. This flaw allows an attacker positioned in a man-in-the-middle (MitM) role to intercept and potentially read confidential data transmitted between the client and the Weblate server. However, exploitation requires local access or network positioning, limited privileges (PR:L), and user interaction (UI:R), with a high attack complexity (AC:H). The CVSS v3.1 base score is 2.5, reflecting a low severity primarily due to these constraints and the limited impact scope. The vulnerability affects confidentiality (C:L) but does not impact integrity or availability. The scope is changed (S:C), indicating that the vulnerability could affect resources beyond the initially vulnerable component. No known exploits are currently in the wild, and the issue is resolved in wlc version 1.17.0. Organizations using wlc should upgrade to this version to ensure proper SSL verification and secure API communication.

Potential Impact

For European organizations, the primary impact is the potential exposure of sensitive translation data or API credentials during communication with Weblate servers if an attacker can intercept traffic. While the vulnerability does not allow code execution or service disruption, confidentiality breaches could lead to leakage of proprietary or sensitive localization content, which might include unreleased product information or internal documentation. Organizations relying heavily on Weblate for software localization, especially those handling sensitive or regulated data, could face compliance risks under GDPR if data confidentiality is compromised. The requirement for local access or network positioning and user interaction limits the likelihood of widespread exploitation, but insider threats or compromised internal networks could increase risk. The vulnerability's low severity means it is unlikely to be a primary attack vector but should be addressed to maintain a strong security posture.

Mitigation Recommendations

The definitive mitigation is to upgrade the wlc client to version 1.17.0 or later, where proper SSL certificate validation is enforced for all URLs. Organizations should audit their deployment of wlc to identify any instances running vulnerable versions. Additionally, enforcing network segmentation and strict access controls can reduce the risk of MitM attacks within internal networks. Using VPNs or encrypted tunnels for remote access to Weblate servers can further protect API communications. Monitoring for unusual network activity or unexpected certificate warnings can help detect attempted exploitation. Finally, educating users about the risks of interacting with untrusted URLs or networks when using wlc can reduce the chance of successful attacks requiring user interaction.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T05:19:12.921Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696538adda2266e838f1b6ad

Added to database: 1/12/2026, 6:08:45 PM

Last enriched: 1/12/2026, 6:23:19 PM

Last updated: 1/13/2026, 6:43:12 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats